Livelessons - Enterprise Penetration Testing and Continuous Monitoring (The Art of Hacking Series)


File Information

File Size:   6.56 GB
Creat Time:   2024-08-13
Active Degree:   14
Last Active:   2024-11-21
Magnet Link:    Magnet LinkMagnet Link
Statement:   This site does not provide download links, only text displays, and does not contain any infringement.

File List

  1. 11.2.1 Understanding the Red Team Environment.mp4 639.99 MB
  2. 04.1.2 Understanding Enterprise Wide Penetration Testing.mp4 464.17 MB
  3. 03.1.1 Introducing Red Teams and Enterprise Hacking.mp4 322.07 MB
  4. 14.3.1 Surveying Social Engineering Methodologies.mp4 236.79 MB
  5. 33.6.3 Exploring the Hidden Cost of Open Source Software.mp4 227.98 MB
  6. 37.7.2 Understanding Lateral Movement.mp4 222.70 MB
  7. 07.1.5 Surveying Operational Processes and Policies for the Red Team.mp4 217.31 MB
  8. 49.9.1 Understanding the Challenge of Testing Cloud Services.mp4 215.75 MB
  9. 21.4.4 Exploring How to Automate Scans.mp4 210.64 MB
  10. 16.3.3 Exploiting Social Engineering Tools.mp4 197.08 MB
  11. 06.1.4 Exploring How to Plan and Fund a Red Team.mp4 190.49 MB
  12. 50.9.2 Exploring How to Test in the Cloud.mp4 185.93 MB
  13. 34.6.4 Learning How to Host Enterprise Capture the Flag Events.mp4 183.69 MB
  14. 28.5.2 Exploring Web App Testing Essential Tools.mp4 175.80 MB
  15. 05.1.3 Understanding the Difference Between Red and Blue Teams.mp4 163.36 MB
  16. 15.3.2 Understanding How to Target Employees.mp4 160.58 MB
  17. 09.1.7 Understanding Red Team Collaboration.mp4 154.42 MB
  18. 23.4.6 Exploring Vulnerability Scanners.mp4 152.77 MB
  19. 45.8.6 Searching for Sensitive Data.mp4 145.03 MB
  20. 08.1.6 Understanding How to Create and Hire the Red Team.mp4 139.92 MB
  21. 12.2.2 Understanding Passive Recon.mp4 139.07 MB
  22. 01.Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking - Introduction.mp4 136.08 MB
  23. 42.8.3 Understanding How to Compromise User Credentials.mp4 130.84 MB
  24. 22.4.5 Using Shodan and Its API.mp4 108.73 MB
  25. 46.8.7 Understanding Data Exfiltration Techniques.mp4 105.62 MB
  26. 29.5.3 Understanding Enterprise Application Continuous Testing.mp4 96.94 MB
  27. 54.Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking - Summary.mp4 94.37 MB
  28. 19.4.2 Understanding the Operational Impact of Enterprise-wide Scanning.mp4 81.98 MB
  29. 41.8.2 Learning How to Achieve Domain Admin Access.mp4 81.28 MB
  30. 47.8.8 Understanding How to Cover Your Tracks.mp4 80.04 MB
  31. 36.7.1 Learning Privilege Escalation Methodologies.mp4 75.83 MB
  32. 52.10.1 Surveying Final Reports for Transactional Penetration Testing Events.mp4 75.48 MB
  33. 32.6.2 Understanding What Hosts to Target and the Scope of the Testing.mp4 71.64 MB
  34. 18.4.1 Exploring Network and Vulnerability Scanning Methodologies.mp4 70.80 MB
  35. 02.Learning objectives.mp4 69.05 MB
  36. 38.7.3 Surveying Privilege Escalation Essential Tools.mp4 62.00 MB
  37. 39.Learning objectives.mp4 56.60 MB
  38. 43.8.4 Surveying Password Cracking & Reporting.mp4 49.19 MB
  39. 24.4.7 Understanding Binary and Source Code Scanners.mp4 47.17 MB
  40. 20.4.3 Understanding Scanning Tools.mp4 46.60 MB
  41. 17.Learning objectives.mp4 41.34 MB
  42. 27.5.1 Exploring How to Target Hosts.mp4 41.00 MB
  43. 25.4.8 Understanding How to Perform Continuous Monitoring.mp4 40.38 MB
  44. 44.8.5 Understanding That Domain Admin Is Not the End Goal.mp4 37.34 MB
  45. 35.Learning objectives.mp4 32.38 MB
  46. 10.Learning objectives.mp4 31.85 MB
  47. 26.Learning objectives.mp4 30.09 MB
  48. 53.10.2 Surveying Continouos Reporting for Enterprise Continuous Monitoring.mp4 29.69 MB
  49. 31.6.1 Understanding How to Initially Get on the Network.mp4 28.12 MB
  50. 48.Learning objectives.mp4 26.66 MB