5.00
(4 التقييمات)
eJPTv2 Prep
تصنيفات اختبار الاختراق, اي ليرن سيكيورتي
ماذا ستتعلم فى الدورة ؟
- Penetration Testing Basics
- Vulnerability Assessment
- Network Attacks
- Web Attacks
محتوى الدورة
مكتمل [جزء اختياري] – Prerequisites
هذا الجزء اختياري من خارج الدورة فى حالة لم تكن علي دراية بأساسيات الشبكات و الويب واختبار الإختراق من قبل.
-
44:37
-
01.1- Introduction – Part 1
42:20 -
01.2- Introduction – Part 2
18:36 -
01.3- Introduction – Part 3 (HTTP(S) Traffic Sniffing Lab)
26:37 -
02.1- Networking – Part 1
57:54 -
02.2- Networking – Part 2
55:00 -
02.3- Networking – Part 3
01:10:05 -
02.4- Networking – Part 4
53:52 -
02.5- Networking – Part 5
01:05:19 -
02.6- Networking – Part 6 (Find The Secret Server Lab)
13:18 -
02.7- Networking – Part 7
50:39 -
02.8- Networking – Part 8 (Data Exfiltration Lab) – OLD
01:15:37 -
02.9- Networking – Part 8 (Data Exfiltration Lab) – NEW
47:35 -
03.1- Web Applications – Part 1
01:04:50 -
03.2- Web Applications – Part 2
01:02:30 -
03.3- Web Applications – Part 3
47:29 -
03.4- Web Applications – Part 4 (Burp Suite Basics Lab) – OLD
56:50 -
03.4- Web Applications – Part 4 (Burp Suite Basics Lab) – NEW
01:25:23 -
03.5- Web Applications – Part 5 (Burp Suite Lab)
01:03:13 -
04- Penetration Testing
01:30:54
مكتمل – Section 1: Assessment Methodologies
-
1.1.1- Information Gathering – Part 1
39:15 -
1.1.2- Information Gathering – Part 2
01:14:02 -
1.1.3- Information Gathering – Part 3
01:07:28 -
1.1.4- Information Gathering – Part 4
01:11:24 -
1.1.5- Information Gathering – Part 5 (Windows Recon- Nmap Host Discovery Lab)
18:43 -
1.2.1- Footprinting and Scanning – Part 1
03:55 -
1.2.2- Footprinting and Scanning – Part 2
55:46 -
1.2.3- Footprinting and Scanning – Part 3
01:01:41 -
1.2.4- Footprinting and Scanning – Part 4
01:13:49 -
1.2.5- Footprinting and Scanning – Part 5 (Windows Recon – Zenmap Lab)
24:41 -
1.2.6- Footprinting and Scanning – Part 6 (Scan the Server 1 Lab)
12:19 -
1.2.7- Footprinting and Scanning – Part 7 (Scan the Server 2 Lab)
16:36 -
1.2.8- Footprinting and Scanning – Part 8 (Scan the Server 3 Lab)
07:18 -
1.3.1- Enumeration – Part 1
05:01 -
1.3.2- Enumeration – Part 2
01:27:45 -
1.3.3- Enumeration – Part 3 (Windows Recon – SMB Discover and Mount Lab)
23:46 -
1.3.4- Enumeration – Part 4 (Windows Recon – SMB Nmap Scripts Lab)
46:07 -
1.3.5- Enumeration – Part 5 (Windows Recon – SMBMap Lab)
26:41 -
1.3.6- Enumeration – Part 6 (Samba Recon Basics Lab)
16:08 -
1.3.7- Enumeration – Part 7 (Samba Recon Basics II Lab)
16:13 -
1.3.8- Enumeration – Part 8 (Samba Recon Basics III Lab)
12:51 -
1.3.9- Enumeration – Part 9 (Samba Recon – Dictionary Attack Lab)
18:26 -
1.3.10- Enumeration – Part 10 (ProFTP Recon – Basics Lab)
17:57 -
1.3.11- Enumeration – Part 11 (VSFTPD Recon – Basics Lab)
07:46 -
1.3.12- Enumeration – Part 12 (SSH Recon – Basic Lab)
21:52 -
1.3.13- Enumeration – Part 13 (SSH Recon – Dictionary Attack Lab)
17:09 -
1.3.14- Enumeration – Part 14 (Windows Recon – IIS Lab)
17:08 -
1.3.15- Enumeration – Part 15 (Windows Recon – IIS Nmap Scripts Lab)
09:48 -
1.3.16- Enumeration – Part 16 (Apache Recon – Basics Lab)
19:58 -
1.3.17- Enumeration – Part 17 (MySQL Recon – Basics Lab)
32:23 -
1.3.18- Enumeration – Part 18 (MySQL Dictionary Attack Lab)
06:27 -
1.3.19- Enumeration – Part 19 (MySQL Recon – Nmap Scripts Lab)
17:00 -
1.3.20- Enumeration – Part 20 (MySQL Recon – Metasploit Lab)
11:56 -
1.4.1- Vulnerability Assessment – Part 1
03:19 -
1.4.2- Vulnerability Assessment – Part 2
34:33 -
1.4.3- Vulnerability Assessment – Part 3 (Nessus Lab)
48:18 -
1.4.4- Vulnerability Assessment – Part 4 (Windows – Easy File Sharing ServerLab)
15:41 -
1.4.5- [BONUS] Metasploit and Meterpreter
01:02:39
مكتمل – Section 2: Host & Networking Auditing
-
2.1.1- Auditing Fundamentals – Part 1
29:16 -
2.1.2- Auditing Fundamentals – Part 2 (Nessus Lab)
48:18
مكتمل – Section 3: Host & Network Penetration Testing
-
3.1.1- System-Host Based Attacks – Part 1
24:52 -
3.1.2- System-Host Based Attacks – Part 2 (Windows – IIS Server DAVTest Lab)
23:54 -
3.1.3- System-Host Based Attacks – Part 3 (Windows – IIS Server WebDav Metasploit Lab)
24:16 -
3.1.4- System-Host Based Attacks – Part 4
16:33 -
3.1.5- System-Host Based Attacks – Part 5 (Windows – SMB Server PSexec Lab)
18:13 -
3.1.6- System-Host Based Attacks – Part 6
09:02 -
3.1.7- System-Host Based Attacks – Part 7 (Windows – Insecure RDP Service Lab)
19:05 -
3.1.8- System-Host Based Attacks – Part 8
03:53 -
3.1.9- System-Host Based Attacks – Part 9 (WinRM – Exploitation with Metasploit Lab)
28:34 -
3.1.10- System-Host Based Attacks – Part 10
12:44 -
3.1.11- System-Host Based Attacks – Part 11
11:17 -
3.1.12- System-Host Based Attacks – Part 12 (UAC Bypass – UACMe Lab)
37:03 -
3.1.13- System-Host Based Attacks – Part 13
12:41 -
3.1.14- System-Host Based Attacks – Part 14 (Privilege Escalation – Impersonate Lab)
13:45 -
3.1.15- System-Host Based Attacks – Part 15
30:52 -
3.1.16- System-Host Based Attacks – Part 16 (Unattended Installation Lab)
22:16 -
3.1.17- System-Host Based Attacks – Part 17 (Windows – Meterpreter – Kiwi Extension Lab)
15:33 -
3.1.18.1- System-Host Based Attacks – Part 18
14:30 -
3.1.18.2- [BONUS] Introducing Linux – Part 1
36:37 -
3.1.18.3- [BONUS] Introducing Linux – Part 2
54:27 -
3.1.19- System-Host Based Attacks – Part 19 (Shellshock Lab)
22:48 -
3.1.20- System-Host Based Attacks – Part 20
09:56 -
3.1.21- System-Host Based Attacks – Part 21 (ProFTP Recon – Basics Lab)
17:57 -
3.1.22- System-Host Based Attacks – Part 22 (SSH Login Lab)
12:05 -
3.1.23- System-Host Based Attacks – Part 23 (Samba Recon – Dictionary Attack Lab)
19:43 -
3.1.24- System-Host Based Attacks – Part 24
14:53 -
3.1.25- System-Host Based Attacks – Part 25 (Cron Jobs Gone Wild II Lab)
31:23 -
3.1.26- System-Host Based Attacks – Part 26 (Exploiting Setuid Programs Lab)
10:45 -
3.1.27- System-Host Based Attacks – Part 27 (Password Cracker – Linux Lab)
14:07 -
3.2.1- Network-Based Attacks Part 1
04:30 -
3.2.2- Network-Based Attacks Part 2
50:39 -
3.2.3- Network-Based Attacks Part 3
22:06 -
3.2.4- Network-Based Attacks – Part 4 (Getting Started – Tshark Lab)
19:24 -
3.2.5- Network-Based Attacks – Part 5 (Filtering Basics – HTTP Lab)
21:38 -
3.2.6- Network-Based Attacks – Part 6 (ARP Poisoning Lab)
21:18 -
3.2.7- Network-Based Attacks – Part 7 (WiFi Security – Traffic Analysis I Lab)
44:54 -
3.2.8- Network-Based Attacks – Part 8 (Filtering Advanced – WiFi Lab)
16:20 -
3.3.1- The Metasploit Framework – Part 1
33:57 -
3.3.2- The Metasploit Framework – Part 2
36:31 -
3.3.3- The Metasploit Framework – Part 3
08:14 -
3.3.4- The Metasploit Framework – Part 4 (Windows Recon – Nmap Host Discovery Lab)
18:43 -
3.3.5- The Metasploit Framework – Part 5 (Importing Nmap Scan Results Into MSF Lab)
16:50 -
3.3.6- The Metasploit Framework – Part 6 (Network Service Scanning Lab)
40:45 -
3.3.7- The Metasploit Framework – Part 7
14:19 -
3.3.8- The Metasploit Framework – Part 8 (FTP Enumeration Lab)
11:23 -
3.3.9- The Metasploit Framework – Part 9 (Samba Recon – Basics Lab)
16:08 -
3.3.10- The Metasploit Framework – Part 10 (Apache Enumeration Lab)
44:24 -
3.3.11- The Metasploit Framework – Part 11 (MySQL Enumeration Lab)
18:00 -
3.3.12- The Metasploit Framework – Part 12 (SSH Login Lab)
12:05 -
3.3.14- The Metasploit Framework – Part 14
09:22 -
3.3.15- The Metasploit Framework – Part 15 (Web App Vulnerability Scanning With WMAP Lab)
14:46 -
3.3.16.1- The Metasploit Framework – Part 16
18:28 -
3.3.16.2- [BONUS] Generating Payloads With Msfvenom
30:33 -
3.3.16.3- [BONUS] Encoding Payloads With Msfvenom
15:32 -
3.3.16.4- [BONUS] Injecting Payloads Into Windows Portable Executables
11:02 -
3.3.16.5- [BONUS] Automating Metasploit With Resource Scripts
16:26 -
3.3.17- The Metasploit Framework – Part 17 (Windows – HTTP File Server Lab)
19:00 -
3.3.18- The Metasploit Framework – Part 18
08:46 -
3.3.19- The Metasploit Framework – Part 19 (WinRM – Exploitation with Metasploit Lab)
28:34 -
3.3.20- The Metasploit Framework – Part 20 (Windows – Java Web Server Lab)
09:10 -
3.3.21- The Metasploit Framework – Part 21
10:09 -
3.3.22- The Metasploit Framework – Part 22 (Vulnerable FTP Server Lab)
07:22 -
3.3.23- The Metasploit Framework – Part 23 (Vulnerable File Sharing Service Lab)
05:11 -
3.3.24- The Metasploit Framework – Part 24 (Vulnerable SSH server Lab)
04:42 -
3.3.25- The Metasploit Framework – Part 25 (Vulnerable SMTP Server Lab)
06:56 -
3.3.26- The Metasploit Framework – Part 26
08:42 -
3.3.27- The Metasploit Framework – Part 27 (Meterpreter Basics Lab)
37:26 -
3.3.28- The Metasploit Framework – Part 28 (Upgrading Command Shells To Meterpreter Shells Lab)
08:52 -
3.3.29- The Metasploit Framework – Part 29
05:17 -
3.3.30- The Metasploit Framework – Part 30 (Windows Post Exploitation Modules Lab)
24:34 -
3.3.31- The Metasploit Framework – Part 31 (UAC Bypass – Memory Injection Lab)
20:45 -
3.3.32- The Metasploit Framework – Part 32
14:28 -
3.3.33- The Metasploit Framework – Part 33 (Privilege Escalation – Impersonate Lab)
13:45 -
3.3.34- The Metasploit Framework – Part 34 (Windows Meterpreter – Kiwi Extension Lab)
15:33 -
3.3.35- The Metasploit Framework – Part 35 (Exploiting SMB With PsExec Lab)
14:52 -
3.3.36- The Metasploit Framework – Part 36
14:03 -
3.3.37- The Metasploit Framework – Part 37 (Maintaining Access – Persistence Service Lab)
19:06 -
3.3.38- The Metasploit Framework – Part 38 (Windows – Enabling Remote Desktop Lab)
11:48 -
3.3.39- The Metasploit Framework – Part 39 (Windows – File and Keylogging Lab)
12:53 -
3.3.40- The Metasploit Framework – Part 40 (Clearing Windows Event Logs Lab)
06:45 -
3.3.41- The Metasploit Framework – Part 41 (Pivoting Lab)
19:40 -
3.3.42- The Metasploit Framework – Part 42
05:29 -
3.3.43- The Metasploit Framework – Part 43 (Post Exploitation Lab I Lab)
25:57 -
3.3.44- The Metasploit Framework – Part 44 (Privilege Escalation – Rootkit Scanner Lab)
13:10 -
3.3.45- The Metasploit Framework – Part 45 (Post Exploitation Lab II Lab)
09:27 -
3.3.46- The Metasploit Framework – Part 46 (Establishing Persistence On Linux Lab)
16:25 -
3.3.47- The Metasploit Framework – Part 47 (Port Scanning and Enumeration With Armitage Lab)
07:13 -
3.3.48- The Metasploit Framework – Part 48 (Exploitation and Post Exploitation With Armitage Lab)
12:02 -
3.4.1- Exploitation – Part 1
17:52 -
3.4.2- Exploitation – Part 2 (SSH Recon – Basic Lab)
21:52 -
3.4.3- Exploitation – Part 3 (Shellshock Lab)
22:48 -
3.4.4- Exploitation – Part 4 (Windows – HTTP File Server Lab)
19:00 -
3.4.5- Exploitation – Part 5
27:34 -
3.4.6- Exploitation – Part 6 (Netcat Fundamentals Lab)
26:44 -
3.4.7- Exploitation – Part 7 (Bind Shells Lab)
10:55 -
3.4.8- Exploitation – Part 8 (Windows – File and Keylogging Lab)
12:53 -
3.4.9- Exploitation – Part 9
19:49 -
3.4.10- Exploitation – Part 10 (Windows – Workflow Platform Lab)
11:00 -
3.4.11- Exploitation – Part 11
07:14 -
3.4.12- Exploitation – Part 12 (Port Scanning and Enumeration – Windows Lab)
18:01 -
3.4.13- Exploitation – Part 13 (Targeting Microsoft IIS FTP Lab)
12:58 -
3.4.14- Exploitation – Part 14 (Targeting OpenSSH Lab)
07:33 -
3.4.15- Exploitation – Part 15 (Targeting SMB Lab)
14:31 -
3.4.16- Exploitation – Part 16 (Targeting MySQL Database Server Lab)
14:30 -
3.4.17- Exploitation – Part 17 (Port Scanning and Enumeration – Linux Lab)
11:46 -
3.4.18- Exploitation – Part 18 (Targeting vsFTPd Lab)
10:10 -
3.4.19- Exploitation – Part 19 (Targeting PHP Lab)
07:21 -
3.4.20- Exploitation – Part 20 (Targeting SAMBA Lab)
05:02 -
3.4.21- Exploitation – Part 21
16:34 -
3.5.1- Post-Exploitation – Part 1
14:51 -
3.5.2- Post-Exploitation – Part 2 (Enumerating Windows System Information Lab)
16:34 -
3.5.3- Post-Exploitation – Part 3 (Enumerating Windows Users and Groups Lab)
13:59 -
3.5.4- Post-Exploitation – Part 4 (Enumerating Windows Network Information Lab)
09:02 -
3.5.5- Post-Exploitation – Part 5 (Enumerating Windows Processes and Services Lab)
15:21 -
3.5.6- Post-Exploitation – Part 6 (Automating Windows Local Enumeration)
20:31 -
3.5.7- Post-Exploitation – Part 7
04:58 -
3.5.8- Post-Exploitation – Part 8 (Enumerating Linux System Information Lab)
13:10 -
3.5.9- Post-Exploitation – Part 9 (Enumerating Linux Users and Groups Lab)
07:48 -
3.5.10- Post-Exploitation – Part 10 (Enumerating Linux Network Information Lab)
09:54 -
3.5.11- Post-Exploitation – Part 11 (Enumerating Linux Processes and Cron Jobs Lab)
08:44 -
3.5.12- Post-Exploitation – Part 12 (Automating Linux Local Enumeration Lab)
16:04 -
3.5.13- Post-Exploitation – Part 13
05:17 -
3.5.14- Post-Exploitation – Part 14 (Setting Up A Web Server With Python Lab)
07:38 -
3.5.15- Post-Exploitation – Part 15 (Transferring Files To Windows Targets Lab)
16:04 -
3.5.16- Post-Exploitation – Part 16 (Transferring Files To Linux Targets Lab)
07:51 -
3.5.17- Post-Exploitation – Part 17
04:48 -
3.5.18- Post-Exploitation – Part 18 (Upgrading Non-Interactive Shells Lab)
05:03 -
3.5.19- Post-Exploitation – Part 19 (Windows – PrivescCheck Lab)
14:00 -
3.5.20- Post-Exploitation – Part 20 (Permissions Matter! Lab)
14:58 -
3.5.21- Post-Exploitation – Part 21 (Editing Gone Wrong Lab)
09:20 -
3.5.22- Post-Exploitation – Part 22
08:04 -
3.5.23- Post-Exploitation – Part 23 (Maintaining Access – Persistence Service Lab)
19:06 -
3.5.24- Post-Exploitation – Part 24 (Maintaining Access – RDP Lab)
12:39 -
3.5.25- Post-Exploitation – Part 25 (Maintaining Access I Lab)
11:29 -
3.5.26- Post-Exploitation – Part 26 (T1168 – Local Job Scheduling Lab)
09:06 -
3.5.27- Post-Exploitation – Part 27
15:46 -
3.5.28- Post-Exploitation – Part 28 (Windows – NTLM Hash Cracking Lab)
11:04 -
3.5.29- Post-Exploitation – Part 29 (Password Cracker – Linux Lab)
14:07 -
3.5.30- Post-Exploitation – Part 30
06:50 -
3.5.31- Post-Exploitation – Part 31 (Pivoting Lab)
19:40 -
3.5.32- Post-Exploitation – Part 32 (Clearing Your Tracks On Windows Lab)
04:48 -
3.5.33- Post-Exploitation – Part 33 (Clearing Your Tracks On Linux Lab)
04:24 -
3.6.1- Social Engineering – Part 1
33:36 -
3.6.2- Social Engineering – Part 2 (Let’s Go Phishing Lab)
27:19
مكتمل – Section 4: Web Application Penetration Testing
-
04.1.1- Introduction to the Web and HTTP Protocol – Part 1
06:16 -
04.1.2- Introduction to the Web and HTTP Protocol – Part 2
01:04:28 -
04.1.3- Introduction to the Web and HTTP Protocol – Part 3
01:08:29 -
04.1.4- Introduction to the Web and HTTP Protocol – Part 4 (Burp Suite Basics)
35:58 -
04.1.5- Introduction to the Web and HTTP Protocol – Part 5 (HTTP Method Enumeration Lab)
01:02:06 -
04.1.6- Introduction to the Web and HTTP Protocol – Part 6 (Directory Enumeration with Gobuster Lab)
21:49 -
04.1.7- Introduction to the Web and HTTP Protocol – Part 7 (Directory Enumeration with Burp Suite Lab)
13:20 -
04.1.8- Introduction to the Web and HTTP Protocol – Part 8
01:36:25 -
04.1.9- Introduction to the Web and HTTP Protocol – Part 9
01:04:31 -
04.1.10- Introduction to the Web and HTTP Protocol – Part 10 (Scanning Web Application with ZAProxyLab)
31:14 -
04.1.11- Introduction to the Web and HTTP Protocol – Part 11 (Scanning Web Application with Nikto Lab)
35:08 -
04.1.12- Introduction to the Web and HTTP Protocol – Part 12 (Passive Crawling with Burp Suite Lab)
09:10 -
04.1.13- Introduction to the Web and HTTP Protocol – Part 13 (SQL Injection with SQLMap Lab)
26:53 -
04.1.14- Introduction to the Web and HTTP Protocol – Part 14 (XSS Attack with XSSer Lab)
21:08 -
04.1.15- Introduction to the Web and HTTP Protocol – Part 15 (Authenticated XSS Attack with XSSer Lab)
10:34 -
04.1.16- Introduction to the Web and HTTP Protocol – Part 16 (Attacking HTTP Login Form with Hydra Lab)
21:59 -
04.1.17- Introduction to the Web and HTTP Protocol – Part 17 (Attacking Basic Auth with Burp Suite Lab)
19:41 -
04.1.18- Introduction to the Web and HTTP Protocol – Part 18 (Attacking HTTP Login Form with ZAProxy Lab)
08:27
تقييمات ومراجعات الطلاب
5.0
Total 3
5
4 Ratings
4
0 Rating
3
0 Rating
2
0 Rating
1
0 Rating
Thank you Netriders
I already got the certificate
Nice Course