[FreeTutorials.Eu] [UDEMY] CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam [FTU]


[FreeTutorials.Eu] [UDEMY] CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam [FTU]
Category:
Date:
01/24/19 at 4:05pm GMT+1
Submitter:
Seeders:
3
Leechers:
0
File size:
8.2 GB in 99 files

Torrent Status:
  This torrent has been verified.

Infohash:
887476fea88d4c4742b9f188ef827c4f09de2c3c


File list

  • [FreeTutorials.Eu] [UDEMY] CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam [FTU]
  • icon 01 Introduction/001 CompTIA-Pentest-Study-Notes.pdf 2.2 MB
    icon 01 Introduction/001 Welcome to the course-en.srt 7.8 KB
    icon 01 Introduction/001 Welcome to the course.mp4 75 MB
    icon 01 Introduction/002 Exam Foundations-en.srt 8.3 KB
    icon 01 Introduction/002 Exam Foundations.mp4 87.6 MB
    icon 01 Introduction/003 An Important Message About the Course-en.srt 2.5 KB
    icon 01 Introduction/003 An Important Message About the Course.mp4 20.2 MB
    icon 01 Introduction/004 How to Schedule Your Exam-en.srt 7.1 KB
    icon 01 Introduction/004 How to Schedule Your Exam.mp4 70.5 MB
    icon 02 Domain 1 Planning and Scoping/005 Planning and Scoping (Overview)-en.srt 2.6 KB
    icon 02 Domain 1 Planning and Scoping/005 Planning and Scoping (Overview).mp4 26.2 MB
    icon 02 Domain 1 Planning and Scoping/006 Penetration Testing Methodology-en.srt 5.5 KB
    icon 02 Domain 1 Planning and Scoping/006 Penetration Testing Methodology.mp4 60.6 MB
    icon 02 Domain 1 Planning and Scoping/007 Planning a Penetration Test-en.srt 16.2 KB
    icon 02 Domain 1 Planning and Scoping/007 Planning a Penetration Test.mp4 152.9 MB
    icon 02 Domain 1 Planning and Scoping/008 Rules of Engagement-en.srt 12.5 KB
    icon 02 Domain 1 Planning and Scoping/008 Rules of Engagement.mp4 107.7 MB
    icon 02 Domain 1 Planning and Scoping/009 Legal Concepts-en.srt 21.5 KB
    icon 02 Domain 1 Planning and Scoping/009 Legal Concepts.mp4 195 MB
    icon 02 Domain 1 Planning and Scoping/010 Testing Strategies-en.srt 5.7 KB
    icon 02 Domain 1 Planning and Scoping/010 Testing Strategies.mp4 54.9 MB
    icon 02 Domain 1 Planning and Scoping/011 White Box Support Resources-en.srt 11.8 KB
    icon 02 Domain 1 Planning and Scoping/011 White Box Support Resources.mp4 119.2 MB
    icon 02 Domain 1 Planning and Scoping/012 Types of Assessments-en.srt 12 KB
    icon 02 Domain 1 Planning and Scoping/012 Types of Assessments.mp4 106.2 MB
    icon 02 Domain 1 Planning and Scoping/013 Threat Actors-en.srt 15 KB
    icon 02 Domain 1 Planning and Scoping/013 Threat Actors.mp4 140.2 MB
    icon 02 Domain 1 Planning and Scoping/014 Target Selection-en.srt 10.9 KB
    icon 02 Domain 1 Planning and Scoping/014 Target Selection.mp4 101.8 MB
    icon 02 Domain 1 Planning and Scoping/015 Other Scoping Considerations-en.srt 15.8 KB
    icon 02 Domain 1 Planning and Scoping/015 Other Scoping Considerations.mp4 129.1 MB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/016 Information Gathering and Vulnerability Identification (Overview)-en.srt 5.3 KB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/016 Information Gathering and Vulnerability Identification (Overview).mp4 48.4 MB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/017 Information Gathering-en.srt 23.7 KB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/017 Information Gathering.mp4 189.1 MB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/018 Reconnaissance with CentralOps (Demo)-en.srt 26.3 KB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/018 Reconnaissance with CentralOps (Demo).mp4 120.5 MB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/019 Scanning and Enumeration-en.srt 8.4 KB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/019 Scanning and Enumeration.mp4 84.2 MB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/020 Fingerprinting-en.srt 8.1 KB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/020 Fingerprinting.mp4 78.7 MB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/021 Scanning and Enumeration (Demo)-en.srt 30.1 KB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/021 Scanning and Enumeration (Demo).mp4 177.9 MB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/022 Cryptographic Inspection-en.srt 2.9 KB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/022 Cryptographic Inspection.mp4 28.3 MB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/023 Eavesdropping-en.srt 7.2 KB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/023 Eavesdropping.mp4 62.4 MB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/024 Decompiling and Debugging-en.srt 5.7 KB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/024 Decompiling and Debugging.mp4 50.8 MB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/025 Open Source Research-en.srt 11.9 KB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/025 Open Source Research.mp4 115.4 MB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/026 Vulnerability Scanning-en.srt 18.4 KB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/026 Vulnerability Scanning.mp4 169 MB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/027 Scanning Considerations-en.srt 11.8 KB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/027 Scanning Considerations.mp4 104.5 MB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/028 Application and Container Scans-en.srt 5.8 KB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/028 Application and Container Scans.mp4 54.8 MB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/029 Analyzing Vulnerability Scans-en.srt 15.2 KB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/029 Analyzing Vulnerability Scans.mp4 136.7 MB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/030 Leverage Information for Exploit-en.srt 6.8 KB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/030 Leverage Information for Exploit.mp4 63.7 MB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/031 Common Attack Vectors-en.srt 13.1 KB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/031 Common Attack Vectors.mp4 122 MB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/032 Weaknesses in Specialized Systems-en.srt 22.2 KB
    icon 03 Domain 2 Information Gathering and Vulnerability Identification/032 Weaknesses in Specialized Systems.mp4 202.5 MB
    icon 04 Domain 3 Attacks and Exploits/033 Attacks and Exploits (Overview)-en.srt 4.1 KB
    icon 04 Domain 3 Attacks and Exploits/033 Attacks and Exploits (Overview).mp4 36.6 MB
    icon 04 Domain 3 Attacks and Exploits/034 Social Engineering-en.srt 27.2 KB
    icon 04 Domain 3 Attacks and Exploits/034 Social Engineering.mp4 237.9 MB
    icon 04 Domain 3 Attacks and Exploits/035 Motivation Factors-en.srt 16 KB
    icon 04 Domain 3 Attacks and Exploits/035 Motivation Factors.mp4 138.5 MB
    icon 04 Domain 3 Attacks and Exploits/036 Physical Security Attacks-en.srt 12.5 KB
    icon 04 Domain 3 Attacks and Exploits/036 Physical Security Attacks.mp4 104.9 MB
    icon 04 Domain 3 Attacks and Exploits/037 Lock Picking (Demo)-en.srt 2.9 KB
    icon 04 Domain 3 Attacks and Exploits/037 Lock Picking (Demo).mp4 26.8 MB
    icon 04 Domain 3 Attacks and Exploits/038 Network-based Vulnerabilities-en.srt 30.1 KB
    icon 04 Domain 3 Attacks and Exploits/038 Network-based Vulnerabilities.mp4 255.2 MB
    icon 04 Domain 3 Attacks and Exploits/039 Wireless-based Vulnerabilities-en.srt 18.4 KB
    icon 04 Domain 3 Attacks and Exploits/039 Wireless-based Vulnerabilities.mp4 160.2 MB
    icon 04 Domain 3 Attacks and Exploits/040 Wireless Network Attack (Demo)-en.srt 10.6 KB
    icon 04 Domain 3 Attacks and Exploits/040 Wireless Network Attack (Demo).mp4 77.3 MB
    icon 04 Domain 3 Attacks and Exploits/041 Application-based Vulnerabilities-en.srt 39.4 KB
    icon 04 Domain 3 Attacks and Exploits/041 Application-based Vulnerabilities.mp4 324.4 MB
    icon 04 Domain 3 Attacks and Exploits/042 Local Host Vulnerabilities-en.srt 6.1 KB
    icon 04 Domain 3 Attacks and Exploits/042 Local Host Vulnerabilities.mp4 53 MB
    icon 04 Domain 3 Attacks and Exploits/043 Privilege Escalation (Linux)-en.srt 9.1 KB
    icon 04 Domain 3 Attacks and Exploits/043 Privilege Escalation (Linux).mp4 86.1 MB
    icon 04 Domain 3 Attacks and Exploits/044 Privilege Escalation (Windows)-en.srt 20.6 KB
    icon 04 Domain 3 Attacks and Exploits/044 Privilege Escalation (Windows).mp4 192.7 MB
    icon 04 Domain 3 Attacks and Exploits/045 Privilege Escalation-en.srt 10.8 KB
    icon 04 Domain 3 Attacks and Exploits/045 Privilege Escalation.mp4 93.8 MB
    icon 04 Domain 3 Attacks and Exploits/046 Privilege Escalation (Demo)-en.srt 9.3 KB
    icon 04 Domain 3 Attacks and Exploits/046 Privilege Escalation (Demo).mp4 90.9 MB
    icon 04 Domain 3 Attacks and Exploits/047 Lateral Movement-en.srt 16.8 KB
    icon 04 Domain 3 Attacks and Exploits/047 Lateral Movement.mp4 163.7 MB
    icon 04 Domain 3 Attacks and Exploits/048 Persistence-en.srt 13.2 KB
    icon 04 Domain 3 Attacks and Exploits/048 Persistence.mp4 125 MB
    icon 04 Domain 3 Attacks and Exploits/049 Covering Your Tracks-en.srt 11.6 KB
    icon 04 Domain 3 Attacks and Exploits/049 Covering Your Tracks.mp4 101.6 MB

Similar Torrents