ØMagnet

Livelessons - Enterprise Penetration Testing and Continuous Monitoring (The Art of Hacking Series)

Torrent Hash :
73ab58f5b83d698883d258ca3aebcfc39fa82c9f
Content Size :
6.4 GB
Date :
2020-06-12
Short Magnet :
Short Magnet
https://0mag.biz/!OpLxW6 QR code
Files ( 56 )size
11.2.1 Understanding the Red Team Environment.mp4624.99 MB
04.1.2 Understanding Enterprise Wide Penetration Testing.mp4453.29 MB
03.1.1 Introducing Red Teams and Enterprise Hacking.mp4314.52 MB
14.3.1 Surveying Social Engineering Methodologies.mp4231.24 MB
33.6.3 Exploring the Hidden Cost of Open Source Software.mp4222.64 MB
37.7.2 Understanding Lateral Movement.mp4217.48 MB
07.1.5 Surveying Operational Processes and Policies for the Red Team.mp4212.22 MB
49.9.1 Understanding the Challenge of Testing Cloud Services.mp4210.69 MB
21.4.4 Exploring How to Automate Scans.mp4205.71 MB
16.3.3 Exploiting Social Engineering Tools.mp4192.47 MB
06.1.4 Exploring How to Plan and Fund a Red Team.mp4186.02 MB
50.9.2 Exploring How to Test in the Cloud.mp4181.58 MB
34.6.4 Learning How to Host Enterprise Capture the Flag Events.mp4179.39 MB
28.5.2 Exploring Web App Testing Essential Tools.mp4171.68 MB
05.1.3 Understanding the Difference Between Red and Blue Teams.mp4159.53 MB
15.3.2 Understanding How to Target Employees.mp4156.81 MB
09.1.7 Understanding Red Team Collaboration.mp4150.8 MB
23.4.6 Exploring Vulnerability Scanners.mp4149.19 MB
45.8.6 Searching for Sensitive Data.mp4141.63 MB
08.1.6 Understanding How to Create and Hire the Red Team.mp4136.64 MB
12.2.2 Understanding Passive Recon.mp4135.81 MB
01.Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking - Introduction.mp4132.89 MB
42.8.3 Understanding How to Compromise User Credentials.mp4127.78 MB
22.4.5 Using Shodan and Its API.mp4106.18 MB
46.8.7 Understanding Data Exfiltration Techniques.mp4103.15 MB
29.5.3 Understanding Enterprise Application Continuous Testing.mp494.67 MB
54.Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking - Summary.mp492.16 MB
19.4.2 Understanding the Operational Impact of Enterprise-wide Scanning.mp480.06 MB
41.8.2 Learning How to Achieve Domain Admin Access.mp479.38 MB
47.8.8 Understanding How to Cover Your Tracks.mp478.16 MB
36.7.1 Learning Privilege Escalation Methodologies.mp474.06 MB
52.10.1 Surveying Final Reports for Transactional Penetration Testing Events.mp473.71 MB
32.6.2 Understanding What Hosts to Target and the Scope of the Testing.mp469.96 MB
18.4.1 Exploring Network and Vulnerability Scanning Methodologies.mp469.14 MB
02.Learning objectives.mp467.43 MB
38.7.3 Surveying Privilege Escalation Essential Tools.mp460.55 MB
39.Learning objectives.mp455.28 MB
43.8.4 Surveying Password Cracking & Reporting.mp448.04 MB
24.4.7 Understanding Binary and Source Code Scanners.mp446.07 MB
20.4.3 Understanding Scanning Tools.mp445.51 MB
17.Learning objectives.mp440.37 MB
27.5.1 Exploring How to Target Hosts.mp440.04 MB
25.4.8 Understanding How to Perform Continuous Monitoring.mp439.44 MB
44.8.5 Understanding That Domain Admin Is Not the End Goal.mp436.46 MB
35.Learning objectives.mp431.62 MB
10.Learning objectives.mp431.11 MB
26.Learning objectives.mp429.38 MB
53.10.2 Surveying Continouos Reporting for Enterprise Continuous Monitoring.mp429 MB
31.6.1 Understanding How to Initially Get on the Network.mp427.47 MB
48.Learning objectives.mp426.04 MB

Related Torrents:

三花愛良 - ラブチャートは上昇気流 part22.41 GB
GrandpaLove - Old man with sweet teen on billiard Table531.85 MB
heyzo_12032.19 GB
AGL-0031002.1 MB
Marc.Dorcel.30.Th.Anniversary.DiSC5.FRENCH.XXX.DVDRiP.XviD-LEVRETTE1.38 GB
0904-snis2271.09 GB