-
05.1- Preparing and Defending Against Reconnaissance and Information Gathering
01:27:14
-
05.2- [BONUS] Information Gathering
01:10:09
-
06.1- Preparing and Defending Against Scanning
39:02
-
06.2- [BONUS] Footprinting and Scanning
01:35:22
-
07.1- Preparing and Defending Against Exploitation
01:47:28
-
07.2- [BONUS] ARP Poisoning
22:06
-
07.3- [BONUS] ARP Poisoning Lab
18:49
-
07.4- [BONUS] Metasploit and Meterpreter
01:02:39
-
07.5- [BONUS] Metasploit and Meterpreter Lab
01:25:14
-
08.1- Preparing and Defending Against Post Exploitation – Part 1
01:20:07
-
08.2- Preparing and Defending Against Post Exploitation – Part 2
01:31:28
-
08.3- [BONUS] Post Exploitation – Part 1
35:39
-
08.4- [BONUS] Post Exploitation – Part 2
01:33:54
-
08.5- [BONUS] Post Exploitation – Part 3
27:06
-
08.6- [BONUS] Post Exploitation – Part 4
01:25:25
-
08.7- [BONUS] Post Exploitation – Part 5
51:57
-
08.8- [BONUS] Post Exploitation – Part 6
01:07:11
-
08.9- [BONUS] Post Exploitation – Part 7
01:24:03
-
08.10- [BONUS] – Post Exploitation – Part 8
08:04