Search Torrents
[UDEMY] CompTIA Pentest+ (Ethical Hacking) Course ...
Seeders: 1 Leechers: 0
[UDEMY] CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam [FTU] GloDLS Torrent content (File list)
|
---|
01 Introduction/001 CompTIA-Pentest-Study-Notes.pdf 2.2 MB |
01 Introduction/001 Welcome to the course-en.srt 7.8 KB |
01 Introduction/001 Welcome to the course.mp4 75.0 MB |
01 Introduction/002 Exam Foundations-en.srt 8.3 KB |
01 Introduction/002 Exam Foundations.mp4 87.6 MB |
01 Introduction/003 An Important Message About the Course-en.srt 2.5 KB |
01 Introduction/003 An Important Message About the Course.mp4 20.2 MB |
01 Introduction/004 How to Schedule Your Exam-en.srt 7.1 KB |
01 Introduction/004 How to Schedule Your Exam.mp4 70.5 MB |
02 Domain 1 Planning and Scoping/005 Planning and Scoping (Overview)-en.srt 2.6 KB |
02 Domain 1 Planning and Scoping/005 Planning and Scoping (Overview).mp4 26.2 MB |
02 Domain 1 Planning and Scoping/006 Penetration Testing Methodology-en.srt 5.5 KB |
02 Domain 1 Planning and Scoping/006 Penetration Testing Methodology.mp4 60.6 MB |
02 Domain 1 Planning and Scoping/007 Planning a Penetration Test-en.srt 16.2 KB |
02 Domain 1 Planning and Scoping/007 Planning a Penetration Test.mp4 152.9 MB |
02 Domain 1 Planning and Scoping/008 Rules of Engagement-en.srt 12.5 KB |
02 Domain 1 Planning and Scoping/008 Rules of Engagement.mp4 107.7 MB |
02 Domain 1 Planning and Scoping/009 Legal Concepts-en.srt 21.5 KB |
02 Domain 1 Planning and Scoping/009 Legal Concepts.mp4 195.0 MB |
02 Domain 1 Planning and Scoping/010 Testing Strategies-en.srt 5.7 KB |
02 Domain 1 Planning and Scoping/010 Testing Strategies.mp4 54.9 MB |
02 Domain 1 Planning and Scoping/011 White Box Support Resources-en.srt 11.8 KB |
02 Domain 1 Planning and Scoping/011 White Box Support Resources.mp4 119.2 MB |
02 Domain 1 Planning and Scoping/012 Types of Assessments-en.srt 12.0 KB |
02 Domain 1 Planning and Scoping/012 Types of Assessments.mp4 106.2 MB |
02 Domain 1 Planning and Scoping/013 Threat Actors-en.srt 15.0 KB |
02 Domain 1 Planning and Scoping/013 Threat Actors.mp4 140.2 MB |
02 Domain 1 Planning and Scoping/014 Target Selection-en.srt 10.9 KB |
02 Domain 1 Planning and Scoping/014 Target Selection.mp4 101.8 MB |
02 Domain 1 Planning and Scoping/015 Other Scoping Considerations-en.srt 15.8 KB |
02 Domain 1 Planning and Scoping/015 Other Scoping Considerations.mp4 129.1 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/016 Information Gathering and Vulnerability Identification (Overview)-en.srt 5.3 KB |
03 Domain 2 Information Gathering and Vulnerability Identification/016 Information Gathering and Vulnerability Identification (Overview).mp4 48.4 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/017 Information Gathering-en.srt 23.7 KB |
03 Domain 2 Information Gathering and Vulnerability Identification/017 Information Gathering.mp4 189.1 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/018 Reconnaissance with CentralOps (Demo)-en.srt 26.3 KB |
03 Domain 2 Information Gathering and Vulnerability Identification/018 Reconnaissance with CentralOps (Demo).mp4 120.5 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/019 Scanning and Enumeration-en.srt 8.4 KB |
03 Domain 2 Information Gathering and Vulnerability Identification/019 Scanning and Enumeration.mp4 84.2 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/020 Fingerprinting-en.srt 8.1 KB |
03 Domain 2 Information Gathering and Vulnerability Identification/020 Fingerprinting.mp4 78.7 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/021 Scanning and Enumeration (Demo)-en.srt 30.1 KB |
03 Domain 2 Information Gathering and Vulnerability Identification/021 Scanning and Enumeration (Demo).mp4 177.9 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/022 Cryptographic Inspection-en.srt 2.9 KB |
03 Domain 2 Information Gathering and Vulnerability Identification/022 Cryptographic Inspection.mp4 28.3 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/023 Eavesdropping-en.srt 7.2 KB |
03 Domain 2 Information Gathering and Vulnerability Identification/023 Eavesdropping.mp4 62.4 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/024 Decompiling and Debugging-en.srt 5.7 KB |
03 Domain 2 Information Gathering and Vulnerability Identification/024 Decompiling and Debugging.mp4 50.8 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/025 Open Source Research-en.srt 11.9 KB |
03 Domain 2 Information Gathering and Vulnerability Identification/025 Open Source Research.mp4 115.4 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/026 Vulnerability Scanning-en.srt 18.4 KB |
03 Domain 2 Information Gathering and Vulnerability Identification/026 Vulnerability Scanning.mp4 169.0 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/027 Scanning Considerations-en.srt 11.8 KB |
03 Domain 2 Information Gathering and Vulnerability Identification/027 Scanning Considerations.mp4 104.5 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/028 Application and Container Scans-en.srt 5.8 KB |
03 Domain 2 Information Gathering and Vulnerability Identification/028 Application and Container Scans.mp4 54.8 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/029 Analyzing Vulnerability Scans-en.srt 15.2 KB |
03 Domain 2 Information Gathering and Vulnerability Identification/029 Analyzing Vulnerability Scans.mp4 136.7 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/030 Leverage Information for Exploit-en.srt 6.8 KB |
03 Domain 2 Information Gathering and Vulnerability Identification/030 Leverage Information for Exploit.mp4 63.7 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/031 Common Attack Vectors-en.srt 13.1 KB |
03 Domain 2 Information Gathering and Vulnerability Identification/031 Common Attack Vectors.mp4 122.0 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/032 Weaknesses in Specialized Systems-en.srt 22.2 KB |
03 Domain 2 Information Gathering and Vulnerability Identification/032 Weaknesses in Specialized Systems.mp4 202.5 MB |
04 Domain 3 Attacks and Exploits/033 Attacks and Exploits (Overview)-en.srt 4.1 KB |
04 Domain 3 Attacks and Exploits/033 Attacks and Exploits (Overview).mp4 36.6 MB |
04 Domain 3 Attacks and Exploits/034 Social Engineering-en.srt 27.2 KB |
04 Domain 3 Attacks and Exploits/034 Social Engineering.mp4 237.9 MB |
04 Domain 3 Attacks and Exploits/035 Motivation Factors-en.srt 16.0 KB |
04 Domain 3 Attacks and Exploits/035 Motivation Factors.mp4 138.5 MB |
04 Domain 3 Attacks and Exploits/036 Physical Security Attacks-en.srt 12.5 KB |
04 Domain 3 Attacks and Exploits/036 Physical Security Attacks.mp4 104.9 MB |
04 Domain 3 Attacks and Exploits/037 Lock Picking (Demo)-en.srt 2.9 KB |
04 Domain 3 Attacks and Exploits/037 Lock Picking (Demo).mp4 26.8 MB |
04 Domain 3 Attacks and Exploits/038 Network-based Vulnerabilities-en.srt 30.1 KB |
04 Domain 3 Attacks and Exploits/038 Network-based Vulnerabilities.mp4 255.2 MB |
04 Domain 3 Attacks and Exploits/039 Wireless-based Vulnerabilities-en.srt 18.4 KB |
04 Domain 3 Attacks and Exploits/039 Wireless-based Vulnerabilities.mp4 160.2 MB |
04 Domain 3 Attacks and Exploits/040 Wireless Network Attack (Demo)-en.srt 10.6 KB |
04 Domain 3 Attacks and Exploits/040 Wireless Network Attack (Demo).mp4 77.3 MB |
04 Domain 3 Attacks and Exploits/041 Application-based Vulnerabilities-en.srt 39.4 KB |
04 Domain 3 Attacks and Exploits/041 Application-based Vulnerabilities.mp4 324.4 MB |
04 Domain 3 Attacks and Exploits/042 Local Host Vulnerabilities-en.srt 6.1 KB |
04 Domain 3 Attacks and Exploits/042 Local Host Vulnerabilities.mp4 53.0 MB |
04 Domain 3 Attacks and Exploits/043 Privilege Escalation (Linux)-en.srt 9.1 KB |
04 Domain 3 Attacks and Exploits/043 Privilege Escalation (Linux).mp4 86.1 MB |
04 Domain 3 Attacks and Exploits/044 Privilege Escalation (Windows)-en.srt 20.6 KB |
04 Domain 3 Attacks and Exploits/044 Privilege Escalation (Windows).mp4 192.7 MB |
04 Domain 3 Attacks and Exploits/045 Privilege Escalation-en.srt 10.8 KB |
04 Domain 3 Attacks and Exploits/045 Privilege Escalation.mp4 93.8 MB |
04 Domain 3 Attacks and Exploits/046 Privilege Escalation (Demo)-en.srt 9.3 KB |
04 Domain 3 Attacks and Exploits/046 Privilege Escalation (Demo).mp4 90.9 MB |
04 Domain 3 Attacks and Exploits/047 Lateral Movement-en.srt 16.8 KB |
04 Domain 3 Attacks and Exploits/047 Lateral Movement.mp4 163.7 MB |
04 Domain 3 Attacks and Exploits/048 Persistence-en.srt 13.2 KB |
04 Domain 3 Attacks and Exploits/048 Persistence.mp4 125.0 MB |
04 Domain 3 Attacks and Exploits/049 Covering Your Tracks-en.srt 11.6 KB |
04 Domain 3 Attacks and Exploits/049 Covering Your Tracks.mp4 101.6 MB |
04 Domain 3 Attacks and Exploits/050 Persistence and Covering Tracks (Demo)-en.srt 14.9 KB |
04 Domain 3 Attacks and Exploits/050 Persistence and Covering Tracks (Demo).mp4 107.8 MB |
05 Domain 4 Penetration Testing Tools/051 Penetration Testing Tools (Overview)-en.srt 6.4 KB |
05 Domain 4 Penetration Testing Tools/051 Penetration Testing Tools (Overview).mp4 47.6 MB |
05 Domain 4 Penetration Testing Tools/052 Nmap Usage-en.srt 20.2 KB |
05 Domain 4 Penetration Testing Tools/052 Nmap Usage.mp4 194.8 MB |
05 Domain 4 Penetration Testing Tools/053 Nmap Usage (Demo)-en.srt 20.5 KB |
05 Domain 4 Penetration Testing Tools/053 Nmap Usage (Demo).mp4 96.1 MB |
05 Domain 4 Penetration Testing Tools/054 Use Cases for Tools-en.srt 13.5 KB |
05 Domain 4 Penetration Testing Tools/054 Use Cases for Tools.mp4 137.9 MB |
05 Domain 4 Penetration Testing Tools/055 Scanners-en.srt 3.9 KB |
05 Domain 4 Penetration Testing Tools/055 Scanners.mp4 41.0 MB |
05 Domain 4 Penetration Testing Tools/056 Credential Testing Tools-en.srt 12.9 KB |
05 Domain 4 Penetration Testing Tools/056 Credential Testing Tools.mp4 121.2 MB |
05 Domain 4 Penetration Testing Tools/057 Password Cracking (Demo)-en.srt 4.1 KB |
05 Domain 4 Penetration Testing Tools/057 Password Cracking (Demo).mp4 26.2 MB |
05 Domain 4 Penetration Testing Tools/058 Debuggers-en.srt 5.1 KB |
05 Domain 4 Penetration Testing Tools/058 Debuggers.mp4 47.0 MB |
05 Domain 4 Penetration Testing Tools/059 Software Assurance-en.srt 4.2 KB |
05 Domain 4 Penetration Testing Tools/059 Software Assurance.mp4 42.0 MB |
05 Domain 4 Penetration Testing Tools/060 OSINT-en.srt 9.7 KB |
05 Domain 4 Penetration Testing Tools/060 OSINT.mp4 93.2 MB |
05 Domain 4 Penetration Testing Tools/061 Wireless-en.srt 3.6 KB |
05 Domain 4 Penetration Testing Tools/061 Wireless.mp4 33.8 MB |
05 Domain 4 Penetration Testing Tools/062 Web Proxies-en.srt 17.1 KB |
05 Domain 4 Penetration Testing Tools/062 Web Proxies.mp4 105.9 MB |
05 Domain 4 Penetration Testing Tools/063 Social Engineering Tools-en.srt 2.6 KB |
05 Domain 4 Penetration Testing Tools/063 Social Engineering Tools.mp4 23.0 MB |
05 Domain 4 Penetration Testing Tools/064 Remote Access Tools-en.srt 14.0 KB |
05 Domain 4 Penetration Testing Tools/064 Remote Access Tools.mp4 93.9 MB |
05 Domain 4 Penetration Testing Tools/065 Networking Tools-en.srt 3.3 KB |
05 Domain 4 Penetration Testing Tools/065 Networking Tools.mp4 31.2 MB |
05 Domain 4 Penetration Testing Tools/066 Mobile Tools-en.srt 4.1 KB |
05 Domain 4 Penetration Testing Tools/066 Mobile Tools.mp4 41.3 MB |
05 Domain 4 Penetration Testing Tools/067 Miscellaneous Tools-en.srt 9.3 KB |
05 Domain 4 Penetration Testing Tools/067 Miscellaneous Tools.mp4 85.7 MB |
05 Domain 4 Penetration Testing Tools/068 Intro to Programming-en.srt 6.5 KB |
05 Domain 4 Penetration Testing Tools/068 Intro to Programming.mp4 52.3 MB |
05 Domain 4 Penetration Testing Tools/069 Programming Concepts-en.srt 43.7 KB |
05 Domain 4 Penetration Testing Tools/069 Programming Concepts.mp4 405.7 MB |
05 Domain 4 Penetration Testing Tools/070 Bash-Example-Scan-with-Nmap.txt 2.8 KB |
05 Domain 4 Penetration Testing Tools/070 BASH Script Example-en.srt 8.2 KB |
05 Domain 4 Penetration Testing Tools/070 BASH Script Example.mp4 79.6 MB |
05 Domain 4 Penetration Testing Tools/071 Python-Example-Public-IP.txt 2.4 KB |
05 Domain 4 Penetration Testing Tools/071 Python Script Example-en.srt 7.8 KB |
05 Domain 4 Penetration Testing Tools/071 Python Script Example.mp4 61.0 MB |
05 Domain 4 Penetration Testing Tools/072 PowerShell-Example-Enumerator.txt 8.7 KB |
05 Domain 4 Penetration Testing Tools/072 PowerShell Script Example-en.srt 6.8 KB |
05 Domain 4 Penetration Testing Tools/072 PowerShell Script Example.mp4 56.7 MB |
05 Domain 4 Penetration Testing Tools/073 MS17-010-Exploit-700-lines-of-Ruby.txt 25.8 KB |
05 Domain 4 Penetration Testing Tools/073 Ruby-Example-Banner-Grabber.txt 0.8 KB |
05 Domain 4 Penetration Testing Tools/073 Ruby Script Example-en.srt 8.6 KB |
05 Domain 4 Penetration Testing Tools/073 Ruby Script Example.mp4 81.3 MB |
06 Domain 5 Reporting and Communication/074 Reporting and Communication (Overview)-en.srt 4.0 KB |
06 Domain 5 Reporting and Communication/074 Reporting and Communication (Overview).mp4 36.3 MB |
06 Domain 5 Reporting and Communication/075 Pentest Communications-en.srt 19.9 KB |
06 Domain 5 Reporting and Communication/075 Pentest Communications.mp4 164.7 MB |
06 Domain 5 Reporting and Communication/076 Report Writing-en.srt 18.1 KB |
06 Domain 5 Reporting and Communication/076 Report Writing.mp4 150.9 MB |
06 Domain 5 Reporting and Communication/077 Mitigation Strategies-en.srt 15.9 KB |
06 Domain 5 Reporting and Communication/077 Mitigation Strategies.mp4 133.0 MB |
06 Domain 5 Reporting and Communication/078 Post-Report Activities-en.srt 9.7 KB |
06 Domain 5 Reporting and Communication/078 Post-Report Activities.mp4 85.6 MB |
06 Domain 5 Reporting and Communication/079 An-excellent-example-of-a-Penetration-Testing-report-external-link-to-SANS.org-website-.txt 0.5 KB |
06 Domain 5 Reporting and Communication/079 Pentest Report Example-en.srt 1.8 KB |
06 Domain 5 Reporting and Communication/079 Pentest Report Example.mp4 16.6 MB |
07 Conclusion/080 Conclusion-en.srt 3.6 KB |
07 Conclusion/080 Conclusion.mp4 38.3 MB |
07 Conclusion/081 Click-here-to-download-the-Kali-Linux-virtual-machine.txt 0.4 KB |
07 Conclusion/081 Click-here-to-download-the-Metasploitable2-virtual-machine.txt 0.4 KB |
07 Conclusion/081 Creating Your Pentest Lab-en.srt 18.9 KB |
07 Conclusion/081 Creating Your Pentest Lab.mp4 154.5 MB |
07 Conclusion/082 Anatomy-of-a-Cyber-Attack-Beginner-Hacking-with-Metasploit.txt 0.3 KB |
07 Conclusion/082 BONUS Congratulations on Completing the Course-en.srt 1.6 KB |
07 Conclusion/082 BONUS Congratulations on Completing the Course.mp4 16.7 MB |
07 Conclusion/082 CompTIA-CySA-CS0-001-5-Practice-Certification-Exams.txt 0.3 KB |
07 Conclusion/082 CompTIA-CySA-CS0-001-Complete-Course-and-Practice-Exam.txt 0.3 KB |
07 Conclusion/082 CompTIA-Network-Cert-N10-007-Full-Course-Practice-Exam.txt 0.3 KB |
07 Conclusion/082 CompTIA-Network-N10-007-5-Practice-Exams-Simulations.txt 0.3 KB |
07 Conclusion/082 CompTIA-Pentest-PT0-001-Complete-Course-Practice-Exam.txt 0.3 KB |
07 Conclusion/082 How-to-Pass-Certification-Exams-with-Strategic-Test-Taking-.txt 0.3 KB |
07 Conclusion/082 Introduction-to-Cloud-Security-with-Microsoft-Azure.txt 0.3 KB |
07 Conclusion/082 Introduction-to-Malware-Analysis-for-Incident-Responders.txt 0.3 KB |
07 Conclusion/082 ITIL-Foundation-Complete-ITIL-Exam-Preparation-Course.txt 0.3 KB |
07 Conclusion/082 ITIL-Foundation-Cram-to-Pass-the-ITIL-Exam-in-7-Days-.txt 0.3 KB |
07 Conclusion/082 ITIL-Foundation-Practice-Certification-Exams-6-Exams-.txt 0.3 KB |
07 Conclusion/082 PRINCE2-Agile-Foundation-Get-certified-in-the-next-7-days-.txt 0.3 KB |
07 Conclusion/082 PRINCE2-Foundation-Cram-to-Pass-the-PRINCE2-Exam-in-7-Days-.txt 0.3 KB |
07 Conclusion/082 PRINCE2-Foundation-Practice-Certification-Exams-6-Exams-.txt 0.3 KB |
07 Conclusion/082 Risk-Management-for-Cybersecurity-and-IT-Managers.txt 0.4 KB |
07 Conclusion/082 Udemy-Coupon-Codes-Graduate.pdf 2.7 MB |
07 Conclusion/082 -UNOFFICIAL-Certified-Ethical-Hacker-CEH-Practice-Exams.txt 0.3 KB |
07 Conclusion/082 WiFi-Hacking-Wireless-Penetration-Testing-for-Beginners.txt 0.3 KB |
Discuss.FreeTutorials.Us.html 165.7 KB |
FreeCoursesOnline.Me.html 108.3 KB |
FreeTutorials.Eu.html 102.2 KB |
How you can help Team-FTU.txt 0.3 KB |
[TGx]Downloaded from torrentgalaxy.org.txt 0.5 KB |
Torrent Downloaded From GloDls.to.txt 0.1 KB |
- Torrent indexed: 6 years
- Torrent updated: Thursday 24th of January 2019 12:31:49 PM
- Torrent hash: 887476FEA88D4C4742B9F188EF827C4F09DE2C3C
- Torrent size: 8.2 GB
- Torrent category: Tutorials

Community - Add torrent to search results - Stats - DMCA - Removal Request - TOR - Contact
Comments