-
1.1.1- Information Gathering – Part 1
39:15
-
1.1.2- Information Gathering – Part 2
01:14:02
-
1.1.3- Information Gathering – Part 3
01:07:28
-
1.1.4- Information Gathering – Part 4
01:11:24
-
1.1.5- Information Gathering – Part 5 (Windows Recon- Nmap Host Discovery Lab)
18:43
-
1.2.1- Footprinting and Scanning – Part 1
03:55
-
1.2.2- Footprinting and Scanning – Part 2
55:46
-
1.2.3- Footprinting and Scanning – Part 3
01:01:41
-
1.2.4- Footprinting and Scanning – Part 4
01:13:49
-
1.2.5- Footprinting and Scanning – Part 5 (Windows Recon – Zenmap Lab)
24:41
-
1.2.6- Footprinting and Scanning – Part 6 (Scan the Server 1 Lab)
12:19
-
1.2.7- Footprinting and Scanning – Part 7 (Scan the Server 2 Lab)
16:36
-
1.2.8- Footprinting and Scanning – Part 8 (Scan the Server 3 Lab)
07:18
-
1.3.1- Enumeration – Part 1
05:01
-
1.3.2- Enumeration – Part 2
01:27:45
-
1.3.3- Enumeration – Part 3 (Windows Recon – SMB Discover and Mount Lab)
23:46
-
1.3.4- Enumeration – Part 4 (Windows Recon – SMB Nmap Scripts Lab)
46:07
-
1.3.5- Enumeration – Part 5 (Windows Recon – SMBMap Lab)
26:41
-
1.4.1- Vulnerability Assessment – Part 1
03:19
-
1.4.2- Vulnerability Assessment – Part 2
34:33
-
1.4.3- Vulnerability Assessment – Part 3 (Nessus Lab)
48:18
-
1.4.4- Vulnerability Assessment – Part 4 (Windows – Easy File Sharing ServerLab)
15:41
-
1.4.5- [BONUS] Metasploit and Meterpreter
01:02:39