11.2.1 Understanding the Red Team Environment.mp4 | 624.99 MB |
04.1.2 Understanding Enterprise Wide Penetration Testing.mp4 | 453.29 MB |
03.1.1 Introducing Red Teams and Enterprise Hacking.mp4 | 314.52 MB |
14.3.1 Surveying Social Engineering Methodologies.mp4 | 231.24 MB |
33.6.3 Exploring the Hidden Cost of Open Source Software.mp4 | 222.64 MB |
37.7.2 Understanding Lateral Movement.mp4 | 217.48 MB |
07.1.5 Surveying Operational Processes and Policies for the Red Team.mp4 | 212.22 MB |
49.9.1 Understanding the Challenge of Testing Cloud Services.mp4 | 210.69 MB |
21.4.4 Exploring How to Automate Scans.mp4 | 205.71 MB |
16.3.3 Exploiting Social Engineering Tools.mp4 | 192.47 MB |
06.1.4 Exploring How to Plan and Fund a Red Team.mp4 | 186.02 MB |
50.9.2 Exploring How to Test in the Cloud.mp4 | 181.58 MB |
34.6.4 Learning How to Host Enterprise Capture the Flag Events.mp4 | 179.39 MB |
28.5.2 Exploring Web App Testing Essential Tools.mp4 | 171.68 MB |
05.1.3 Understanding the Difference Between Red and Blue Teams.mp4 | 159.53 MB |
15.3.2 Understanding How to Target Employees.mp4 | 156.81 MB |
09.1.7 Understanding Red Team Collaboration.mp4 | 150.8 MB |
23.4.6 Exploring Vulnerability Scanners.mp4 | 149.19 MB |
45.8.6 Searching for Sensitive Data.mp4 | 141.63 MB |
08.1.6 Understanding How to Create and Hire the Red Team.mp4 | 136.64 MB |
12.2.2 Understanding Passive Recon.mp4 | 135.81 MB |
01.Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking - Introduction.mp4 | 132.89 MB |
42.8.3 Understanding How to Compromise User Credentials.mp4 | 127.78 MB |
22.4.5 Using Shodan and Its API.mp4 | 106.18 MB |
46.8.7 Understanding Data Exfiltration Techniques.mp4 | 103.15 MB |
29.5.3 Understanding Enterprise Application Continuous Testing.mp4 | 94.67 MB |
54.Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking - Summary.mp4 | 92.16 MB |
19.4.2 Understanding the Operational Impact of Enterprise-wide Scanning.mp4 | 80.06 MB |
41.8.2 Learning How to Achieve Domain Admin Access.mp4 | 79.38 MB |
47.8.8 Understanding How to Cover Your Tracks.mp4 | 78.16 MB |
36.7.1 Learning Privilege Escalation Methodologies.mp4 | 74.06 MB |
52.10.1 Surveying Final Reports for Transactional Penetration Testing Events.mp4 | 73.71 MB |
32.6.2 Understanding What Hosts to Target and the Scope of the Testing.mp4 | 69.96 MB |
18.4.1 Exploring Network and Vulnerability Scanning Methodologies.mp4 | 69.14 MB |
02.Learning objectives.mp4 | 67.43 MB |
38.7.3 Surveying Privilege Escalation Essential Tools.mp4 | 60.55 MB |
39.Learning objectives.mp4 | 55.28 MB |
43.8.4 Surveying Password Cracking & Reporting.mp4 | 48.04 MB |
24.4.7 Understanding Binary and Source Code Scanners.mp4 | 46.07 MB |
20.4.3 Understanding Scanning Tools.mp4 | 45.51 MB |
17.Learning objectives.mp4 | 40.37 MB |
27.5.1 Exploring How to Target Hosts.mp4 | 40.04 MB |
25.4.8 Understanding How to Perform Continuous Monitoring.mp4 | 39.44 MB |
44.8.5 Understanding That Domain Admin Is Not the End Goal.mp4 | 36.46 MB |
35.Learning objectives.mp4 | 31.62 MB |
10.Learning objectives.mp4 | 31.11 MB |
26.Learning objectives.mp4 | 29.38 MB |
53.10.2 Surveying Continouos Reporting for Enterprise Continuous Monitoring.mp4 | 29 MB |
31.6.1 Understanding How to Initially Get on the Network.mp4 | 27.47 MB |
48.Learning objectives.mp4 | 26.04 MB |