محتوى الدورة
☑ Section 1: Penetration Testing: System Security (Exam Required)
0/21
00- Course Introduction
16:47
01.1- Architecture Fundamentals – Part 1
59:22
01.2- Architecture Fundamentals – Part 2 (System Security Lab)
16:10
02- Assembler Debuggers and Tool Arsenal
53:52
03.1- Buffer Overflow – Part 1
59:31
03.2- Buffer Overflow – Part 2
56:07
03.3- [Bonus] Programming in C++ Part 1
01:07:33
03.4- [Bonus] Programming in C++ Part 2
46:57
03.5- [Bonus] Programming in C++ Part 3
56:37
03.6- [Bonus] Programming in C++ Part 4
46:39
03.7- Buffer Overflow – Part 3
49:10
03.8- Buffer Overflow – Part 4
01:15:09
03.9- Buffer Overflow – Part 5 (Real World Buffer Overflow Lab)
01:26:16
04.1- Shellcoding – Part 1
51:02
04.2- Shellcoding – Part 2
01:18:17
05.1- Cryptography and Password Cracking – Part 1
52:44
05.2- Cryptography and Password Cracking – Part 2
55:36
05.3- Cryptography and Password Cracking – Part 3
01:18:26
05.4- Cryptography and Password Cracking – Part 4
01:30:42
06.1- Malware – Part 1
01:21:30
06.2- Malware – Part 2
41:12
☑ Section 2: Penetration Testing: Network Security (Exam Required)
0/44
00- [Bonus] Penetration Testing Process
01:30:54
01.1- Information Gathering – Part 1
01:35:35
01.2- Information Gathering – Part 2
01:03:07
01.3- Information Gathering – Part 3
01:11:09
01.4- Information Gathering – Part 4
01:56:34
01.5- Information Gathering – Part 5 (Information Gathering Lab)
32:32
02.1- Scanning – Part 1
55:46
02.2- [BONUS] OSI and TCP-IP
57:54
02.3- [BONUS] TCP and UDP
53:52
02.4- Scanning – Part 2
01:01:41
02.5- Scanning – Part 3
01:13:49
02.6- Scanning – Part 4 (Scanning Lab)
56:36
3.1- Enumeration – Part 1
01:27:45
3.2- Enumeration – Part 2
37:28
3.3- [BONUS] Introduction to Metasploit and Meterpreter
01:02:39
3.4- [BONUS] Metasploit and Meterpreter Lab
01:25:14
3.5- Enumeration – Part 3 (NetBIOS Hacking Lab).mp4
01:12:55
3.6- Enumeration – Part 4 (SNMP Analysis Lab)
49:44
04.1- Sniffing and MitM Attacks – Part 1
01:17:03
04.2- Sniffing and MitM Attacks – Part 2
01:14:09
04.3- Sniffing and MitM Attacks – Part 3
49:46
04.4- Sniffing and MitM Attacks – Part 4 (Cain and Abel Lab)
01:35:37
04.5- Sniffing and MitM Attacks – Part 5 (Poisoning and Sniffing Lab)
01:50:09
05.1- Exploitation – Part 1
57:58
05.2- Exploitation – Part 2
48:30
05.3- Exploitation – Part 3
01:25:45
05.4- Exploitation – Part 4
41:22
05.5- Exploitation – Part 5 (VA and Exploitation Lab)
01:25:51
05.6- Exploitation – Part 6 (Nessus Lab)
01:22:52
05.7- Exploitation – Part 7 (Client-Side Exploitation Lab)
01:20:48
06.1- Post Exploitation – Part 1
35:39
06.2- Post Exploitation – Part 2
01:33:54
06.3- Post Exploitation – Part 3
27:06
06.4- Post Exploitation – Part 4
01:25:25
06.5- Post Exploitation – Part 5
51:57
06.6- Post Exploitation – Part 6
01:07:11
06.7- Post Exploitation – Part 7
01:24:03
06.8- Post Exploitation – Part 8
08:04
06.9- Post Exploitation – Part 9 (Post-Exploitation Lab)
01:11:46
06.10- Post Exploitation – Part 10 (Blind Penetration Test Lab)
01:13:42
06.11- Post Exploitation – Part 11 (Privilege Escalation Lab)
52:08
06.12- Post Exploitation – Part 12 (Privilege Escalation Via Services Lab)
43:35
07- Anonymity
40:37
08- Social Engineering
55:15
Section 3: PowerShell for Pentesters (Optional – Will Be Recorded in The Future)
☑ Section 4: Penetration Testing: Linux Exploitation (Exam Required)
0/9
04.1- Introduction
23:17
04.2- Information Gathering – Part 1
01:00:40
04.3- Information Gathering – Part 2
42:45
04.4- Information Gathering – Part 3 (Remote Enumeration Lab)
01:10:53
04.5- Information Gathering – Part 4 (Local Enumeration Lab)
37:22
4.6- Exploitation over the Network – Part 1
43:00
04.7- Exploitation over the Network – Part 2
48:25
04.8- Exploitation over the Network – Part 3
48:35
Post Exploitation
☑ Section 5: Penetration Testing: Web App Security (Exam Required)
0/13
05.0- Section Introduction
03:33
05.1- Introduction – Part 1
01:04:50
05.2- Introduction – Part 2
01:02:30
05.3- Introduction – Part 3
47:29
05.4- Introduction – Part 4 (Burp Suite Basics Lab)
56:50
05.5- Introduction – Part 5 (Burp Suite Lab)
01:03:13
05.6- Information Gathering – Part 1
01:04:28
05.7- Information Gathering – Part 2
01:08:29
05.8- Information Gathering – Part 3 (Dirbuster Lab)
39:43
05.9- Cross Site Scripting – Part 1
01:36:25
05.10- Cross Site Scripting – Part 2 (Cross Site Scripting Lab)
32:43
05.11- SQL Injections – Part 1
01:04:31
05.12- SQL Injections – Part 2 (SQL Injection Lab)
24:11
Section 6: Wifi Security (Optional – Will Be Recorded in The Future)
Section 7: Ruby & Metasploit (Optional – Will Be Recorded in The Future)
Penetration Testing Professional
مواد الدرس
التعليقات
مواد الدرس
Penetration Testing Professional (PTP) – Outlines.txt
Size: 1.66 كيلوبايت
انضم الى النقاش
إرسال
0%
مكتمل
وضع علامة مكتمل
Ask ChatGPT
Word Limit
Set ChatGPT API key
Find your Secret API key in your
ChatGPT User settings
and paste it here to connect ChatGPT with your Tutor LMS website.
Enable ChatGPT
أدرج/ حرر رابط
إغلاق
أدخل رابط التحويل
الرابط
نص الرابط
فتح الرابط في علامة تبويب جديدة
أو قم بالربط مع محتوى موجود
البحث
لم يتم تحديد كلمات البحث. جاري إظهار أحدث العناصر.
ابحث أو استخدم مفتاحي الأسهم للأعلى أو الأسفل لتحديد عنصر.
إلغاء