资源详情

返回首页 | 相关搜索
Udemy - CompTIA PenTest+ (PT0-003) Full Course & Practice Exam (1.2025)
大小 8.94 GB
文件数 635
Info Hash: 4CE049A1E3DE7D35F0F6F60E2E09E4A94B8D68E8
收录时间 2026-02-27 07:05:31
更新时间 2026-02-27 07:05:31
文件列表 (635)
01 - Introduction/001 Introduction.mp4
268.01 MB
01 - Introduction/001 Introduction.srt
27.76 KB
01 - Introduction/002 Comptia-PenTest-PT0-003-Exam-Objectives.pdf
176.94 KB
01 - Introduction/002 CompTIA-PenTest-PT0-003-Study-Guide.pdf
19.96 MB
01 - Introduction/002 CompTIA-PenTest-PTO-003-Study-Plan.pdf
256.09 KB
01 - Introduction/002 Download your free study guide.html
127 B
01 - Introduction/003 Exam Tips.mp4
18.85 MB
01 - Introduction/003 Exam Tips.srt
10.05 KB
01 - Introduction/004 Checkpoint Introduction.html
9.42 KB
02 - PenTesting Overview/001 PenTesting Overview.mp4
13.31 MB
02 - PenTesting Overview/001 PenTesting Overview.srt
6.07 KB
02 - PenTesting Overview/002 Planning the Engagement.mp4
23.31 MB
02 - PenTesting Overview/002 Planning the Engagement.srt
7.36 KB
02 - PenTesting Overview/003 Information Gathering.mp4
14.3 MB
02 - PenTesting Overview/003 Information Gathering.srt
7.05 KB
02 - PenTesting Overview/004 Attacks and Exploits.mp4
15.81 MB
02 - PenTesting Overview/004 Attacks and Exploits.srt
6.59 KB
02 - PenTesting Overview/005 Post-Exploitation.mp4
14.1 MB
02 - PenTesting Overview/005 Post-Exploitation.srt
5.95 KB
02 - PenTesting Overview/006 Reporting.mp4
21.68 MB
02 - PenTesting Overview/006 Reporting.srt
7.81 KB
02 - PenTesting Overview/007 Overview of a PenTest.mp4
67.71 MB
02 - PenTesting Overview/007 Overview of a PenTest.srt
19.99 KB
02 - PenTesting Overview/008 Checkpoint PenTesting Overview.html
12.85 KB
03 - Pre-Engagement Activities/001 Pre-Engagement Activities (OBJ 1.1, 1.2).mp4
15.25 MB
03 - Pre-Engagement Activities/001 Pre-Engagement Activities (OBJ 1.1, 1.2).srt
6.58 KB
03 - Pre-Engagement Activities/002 Regulations and Standards (OBJ 1.1, 1.2).mp4
38.39 MB
03 - Pre-Engagement Activities/002 Regulations and Standards (OBJ 1.1, 1.2).srt
12.39 KB
03 - Pre-Engagement Activities/003 Types of Assessments (OBJ 1.1).mp4
29.69 MB
03 - Pre-Engagement Activities/003 Types of Assessments (OBJ 1.1).srt
9.07 KB
03 - Pre-Engagement Activities/004 Types of Agreements.mp4
36.41 MB
03 - Pre-Engagement Activities/004 Types of Agreements.srt
8.37 KB
03 - Pre-Engagement Activities/005 Legal and Ethical Considerations (OBJ 1.1, 1.2).mp4
24.8 MB
03 - Pre-Engagement Activities/005 Legal and Ethical Considerations (OBJ 1.1, 1.2).srt
8.75 KB
03 - Pre-Engagement Activities/006 Rules of Engagement (OBJ 1.1, 1.2).mp4
43.21 MB
03 - Pre-Engagement Activities/006 Rules of Engagement (OBJ 1.1, 1.2).srt
9.98 KB
03 - Pre-Engagement Activities/007 Target Selection (OBJ 1.1).mp4
29.12 MB
03 - Pre-Engagement Activities/007 Target Selection (OBJ 1.1).srt
8.69 KB
03 - Pre-Engagement Activities/008 Shared Responsibility Model (OBJ 1.1).mp4
38.92 MB
03 - Pre-Engagement Activities/008 Shared Responsibility Model (OBJ 1.1).srt
9.13 KB
03 - Pre-Engagement Activities/009 Preparing to PenTest a Cloud Provider (OBJ 1.1).mp4
12.08 MB
03 - Pre-Engagement Activities/009 Preparing to PenTest a Cloud Provider (OBJ 1.1).srt
9.09 KB
03 - Pre-Engagement Activities/010 Checkpoint Pre-Engagement Activities.html
12.93 KB
04 - Frameworks/001 Frameworks (OBJ 1.3).mp4
43.76 MB
04 - Frameworks/001 Frameworks (OBJ 1.3).srt
6.98 KB
04 - Frameworks/002 MITRE ATT&CK (OBJ 1.3).mp4
37.05 MB
04 - Frameworks/002 MITRE ATT&CK (OBJ 1.3).srt
9.9 KB
04 - Frameworks/003 OWASP (OBJ 1.3).mp4
11.67 MB
04 - Frameworks/003 OWASP (OBJ 1.3).srt
9.3 KB
04 - Frameworks/004 MASVS (OBJ 1.3).mp4
9.77 MB
04 - Frameworks/004 MASVS (OBJ 1.3).srt
7.66 KB
04 - Frameworks/005 PTES (OBJ 1.3).mp4
23.95 MB
04 - Frameworks/005 PTES (OBJ 1.3).srt
10.23 KB
04 - Frameworks/006 CREST (OBJ 1.3).mp4
21.75 MB
04 - Frameworks/006 CREST (OBJ 1.3).srt
8.3 KB
04 - Frameworks/007 STRIDE (OBJ 1.3).mp4
21.37 MB
04 - Frameworks/007 STRIDE (OBJ 1.3).srt
10.79 KB
04 - Frameworks/008 OSSTMM (OBJ 1.3).mp4
29.23 MB
04 - Frameworks/008 OSSTMM (OBJ 1.3).srt
6.69 KB
04 - Frameworks/009 Purdue Model (OBJ 1.3).mp4
10.36 MB
04 - Frameworks/009 Purdue Model (OBJ 1.3).srt
7.13 KB
04 - Frameworks/010 OCTAVE (OBJ 1.3).mp4
40.37 MB
04 - Frameworks/010 OCTAVE (OBJ 1.3).srt
13.81 KB
04 - Frameworks/011 DREAD (OBJ 1.3).mp4
26.64 MB
04 - Frameworks/011 DREAD (OBJ 1.3).srt
9.54 KB
04 - Frameworks/012 Using the MITRE ATT&CK Framework (OBJ 1.3).mp4
44.37 MB
04 - Frameworks/012 Using the MITRE ATT&CK Framework (OBJ 1.3).srt
9.29 KB
04 - Frameworks/013 Checkpoint Frameworks.html
12.58 KB
05 - Information Gathering/001 Information Gathering (OBJ 2.1).mp4
14.03 MB
05 - Information Gathering/001 Information Gathering (OBJ 2.1).srt
6.18 KB
05 - Information Gathering/002 Passive Reconnaissance (OBJ 2.1).mp4
23.99 MB
05 - Information Gathering/002 Passive Reconnaissance (OBJ 2.1).srt
6.63 KB
05 - Information Gathering/003 Network Sniffing (OBJ 2.1).mp4
12.22 MB
05 - Information Gathering/003 Network Sniffing (OBJ 2.1).srt
9.7 KB
05 - Information Gathering/004 Active Reconnaissance (OBJ 2.1).mp4
22.42 MB
05 - Information Gathering/004 Active Reconnaissance (OBJ 2.1).srt
6.87 KB
05 - Information Gathering/005 Port and Protocol Scanning (OBJ 2.1).mp4
15.52 MB
05 - Information Gathering/005 Port and Protocol Scanning (OBJ 2.1).srt
9.83 KB
05 - Information Gathering/006 HTML Scraping and Cached Pages (OBJ 2.1).mp4
8.08 MB
05 - Information Gathering/006 HTML Scraping and Cached Pages (OBJ 2.1).srt
5.75 KB
05 - Information Gathering/007 Banner Grabbing (OBJ 2.1).mp4
20.76 MB
05 - Information Gathering/007 Banner Grabbing (OBJ 2.1).srt
8.88 KB
05 - Information Gathering/008 Conducting Banner Grabbing (OBJ 2.1).mp4
14.75 MB
05 - Information Gathering/008 Conducting Banner Grabbing (OBJ 2.1).srt
6.01 KB
05 - Information Gathering/009 Checkpoint Information Gathering.html
12.63 KB
06 - Open-Source Intelligence (OSINT)/001 Open-Source Intelligence (OSINT) (OBJ 2.1).mp4
12.26 MB
06 - Open-Source Intelligence (OSINT)/001 Open-Source Intelligence (OSINT) (OBJ 2.1).srt
5.91 KB
06 - Open-Source Intelligence (OSINT)/002 Social Media and Job Boards (OBJ 2.1).mp4
25.68 MB
06 - Open-Source Intelligence (OSINT)/002 Social Media and Job Boards (OBJ 2.1).srt
9.41 KB
06 - Open-Source Intelligence (OSINT)/003 Information Disclosures (OBJ 2.1).mp4
12 MB
06 - Open-Source Intelligence (OSINT)/003 Information Disclosures (OBJ 2.1).srt
8.26 KB
06 - Open-Source Intelligence (OSINT)/004 Cryptographic Flaws (OBJ 2.1).mp4
30.34 MB
06 - Open-Source Intelligence (OSINT)/004 Cryptographic Flaws (OBJ 2.1).srt
12.21 KB
06 - Open-Source Intelligence (OSINT)/005 DNS Lookups (OBJ 2.1).mp4
47.49 MB
06 - Open-Source Intelligence (OSINT)/005 DNS Lookups (OBJ 2.1).srt
12.41 KB
06 - Open-Source Intelligence (OSINT)/006 Certificate Transparency Logs (OBJ 2.1).mp4
24.93 MB
06 - Open-Source Intelligence (OSINT)/006 Certificate Transparency Logs (OBJ 2.1).srt
9.69 KB
06 - Open-Source Intelligence (OSINT)/007 Search Engine Analysis (OBJ 2.1).mp4
17.79 MB
06 - Open-Source Intelligence (OSINT)/007 Search Engine Analysis (OBJ 2.1).srt
8.17 KB
06 - Open-Source Intelligence (OSINT)/008 Conducting OSINT (OBJ 2.1).mp4
68.73 MB
06 - Open-Source Intelligence (OSINT)/008 Conducting OSINT (OBJ 2.1).srt
23.17 KB
06 - Open-Source Intelligence (OSINT)/009 Checkpoint Open-Source Intelligence (OSINT).html
12.18 KB
07 - Scanning and Enumeration/001 Scanning and Enumeration (OBJ 2.2).mp4
15.95 MB
07 - Scanning and Enumeration/001 Scanning and Enumeration (OBJ 2.2).srt
7.02 KB
07 - Scanning and Enumeration/002 OS and Service Discovery (OBJ 2.2).mp4
149.9 MB
07 - Scanning and Enumeration/002 OS and Service Discovery (OBJ 2.2).srt
29.15 KB
07 - Scanning and Enumeration/003 Enumerating Protocols (OBJ 2.2).mp4
15.85 MB
07 - Scanning and Enumeration/003 Enumerating Protocols (OBJ 2.2).srt
9.21 KB
07 - Scanning and Enumeration/004 Enumerating DNS (OBJ 2.2).mp4
11.54 MB
07 - Scanning and Enumeration/004 Enumerating DNS (OBJ 2.2).srt
7.53 KB
07 - Scanning and Enumeration/005 Enumerating Directories (OBJ 2.2).mp4
18.52 MB
07 - Scanning and Enumeration/005 Enumerating Directories (OBJ 2.2).srt
9.24 KB
07 - Scanning and Enumeration/006 Enumerating Hosts (OBJ 2.2).mp4
10.78 MB
07 - Scanning and Enumeration/006 Enumerating Hosts (OBJ 2.2).srt
11.43 KB
07 - Scanning and Enumeration/007 Enumerating Users (OBJ 2.2).mp4
11.32 MB
07 - Scanning and Enumeration/007 Enumerating Users (OBJ 2.2).srt
5.31 KB
07 - Scanning and Enumeration/008 Enumerating Email (OBJ 2.2).mp4
8.88 MB
07 - Scanning and Enumeration/008 Enumerating Email (OBJ 2.2).srt
6.55 KB
07 - Scanning and Enumeration/009 Enumerating Permissions (OBJ 2.2).mp4
11.56 MB
07 - Scanning and Enumeration/009 Enumerating Permissions (OBJ 2.2).srt
9.4 KB
07 - Scanning and Enumeration/010 Enumerating Wireless Devices (OBJ 2.2).mp4
34.66 MB
07 - Scanning and Enumeration/010 Enumerating Wireless Devices (OBJ 2.2).srt
9.24 KB
07 - Scanning and Enumeration/011 Enumerating Secrets (OBJ 2.2).mp4
15.55 MB
07 - Scanning and Enumeration/011 Enumerating Secrets (OBJ 2.2).srt
10.13 KB
07 - Scanning and Enumeration/012 Enumerating the Web (OBJ 2.2).mp4
26.6 MB
07 - Scanning and Enumeration/012 Enumerating the Web (OBJ 2.2).srt
8.53 KB
07 - Scanning and Enumeration/013 Attack Path Mapping (OBJ 2.2).mp4
15.07 MB
07 - Scanning and Enumeration/013 Attack Path Mapping (OBJ 2.2).srt
7.66 KB
07 - Scanning and Enumeration/014 Checkpoint Scanning and Enumeration.html
12.33 KB
08 - Recon and Enumeration Tools/001 Reconnaissance and Enumeration Tools (OBJ 2.4).mp4
82.07 MB
08 - Recon and Enumeration Tools/001 Reconnaissance and Enumeration Tools (OBJ 2.4).srt
6.82 KB
08 - Recon and Enumeration Tools/002 Wayback Machine (OBJ 2.4).mp4
8.28 MB
08 - Recon and Enumeration Tools/002 Wayback Machine (OBJ 2.4).srt
5.64 KB
08 - Recon and Enumeration Tools/003 theHarvester and Hunter.io (OBJ 2.4).mp4
15.31 MB
08 - Recon and Enumeration Tools/003 theHarvester and Hunter.io (OBJ 2.4).srt
9.89 KB
08 - Recon and Enumeration Tools/004 OSINT Tools (OBJ 2.4, 4.8).mp4
22.3 MB
08 - Recon and Enumeration Tools/004 OSINT Tools (OBJ 2.4, 4.8).srt
7.72 KB
08 - Recon and Enumeration Tools/005 Whois and recon-ng (OBJ 2.4).mp4
81.98 MB
08 - Recon and Enumeration Tools/005 Whois and recon-ng (OBJ 2.4).srt
44.25 KB
08 - Recon and Enumeration Tools/006 nslookup and dig (OBJ 2.4).mp4
18.43 MB
08 - Recon and Enumeration Tools/006 nslookup and dig (OBJ 2.4).srt
10.97 KB
08 - Recon and Enumeration Tools/007 DNSdumpster and Amass (OBJ 2.4).mp4
26.69 MB
08 - Recon and Enumeration Tools/007 DNSdumpster and Amass (OBJ 2.4).srt
12.05 KB
08 - Recon and Enumeration Tools/008 Shodan and Censys.io (OBJ 2.4).mp4
15.99 MB
08 - Recon and Enumeration Tools/008 Shodan and Censys.io (OBJ 2.4).srt
11.17 KB
08 - Recon and Enumeration Tools/009 tcpdump (OBJ 2.4).mp4
15.61 MB
08 - Recon and Enumeration Tools/009 tcpdump (OBJ 2.4).srt
10.29 KB
08 - Recon and Enumeration Tools/010 Wireshark (OBJ 2.4).mp4
35.85 MB
08 - Recon and Enumeration Tools/010 Wireshark (OBJ 2.4).srt
11.28 KB
08 - Recon and Enumeration Tools/011 Wireless Analysis Tools (OBJ 2.4).mp4
24.51 MB
08 - Recon and Enumeration Tools/011 Wireless Analysis Tools (OBJ 2.4).srt
10.39 KB
08 - Recon and Enumeration Tools/012 Checkpoint Recon and Enumeration Tools.html
12.29 KB
09 - Nmap and NSE/001 Nmap and NSE (OBJ 2.4, 4.2).mp4
8.05 MB
09 - Nmap and NSE/001 Nmap and NSE (OBJ 2.4, 4.2).srt
4.65 KB
09 - Nmap and NSE/002 Nmap Discovery Scans (OBJ 2.4, 4.2).mp4
42.05 MB
09 - Nmap and NSE/002 Nmap Discovery Scans (OBJ 2.4, 4.2).srt
16.05 KB
09 - Nmap and NSE/003 Nmap Port Scans (OBJ 2.4, 4.2).mp4
32.93 MB
09 - Nmap and NSE/003 Nmap Port Scans (OBJ 2.4, 4.2).srt
20.12 KB
09 - Nmap and NSE/004 Nmap Fingerprinting (OBJ 2.4, 4.2).mp4
12.92 MB
09 - Nmap and NSE/004 Nmap Fingerprinting (OBJ 2.4, 4.2).srt
9.02 KB
09 - Nmap and NSE/005 Using Nmap (OBJ 2.4, 4.2).mp4
98.09 MB
09 - Nmap and NSE/005 Using Nmap (OBJ 2.4, 4.2).srt
20.83 KB
09 - Nmap and NSE/006 Nmap Scripting Engine (OBJ 2.4, 4.2).mp4
86 MB
09 - Nmap and NSE/006 Nmap Scripting Engine (OBJ 2.4, 4.2).srt
10.77 KB
09 - Nmap and NSE/007 Checkpoint Nmap and NSE.html
11.89 KB
10 - Scripting Basics/001 Scripting Basics (OBJ 2.3).mp4
12.86 MB
10 - Scripting Basics/001 Scripting Basics (OBJ 2.3).srt
5.09 KB
10 - Scripting Basics/002 Shells and Programming Languages (OBJ 2.3).mp4
63.29 MB
10 - Scripting Basics/002 Shells and Programming Languages (OBJ 2.3).srt
19.97 KB
10 - Scripting Basics/003 Variables (OBJ 2.3).mp4
16.6 MB
10 - Scripting Basics/003 Variables (OBJ 2.3).srt
14.63 KB
10 - Scripting Basics/004 Loops (OBJ 2.3).mp4
8.15 MB
10 - Scripting Basics/004 Loops (OBJ 2.3).srt
9.81 KB
10 - Scripting Basics/005 Logic Control (OBJ 2.3).mp4
7.68 MB
10 - Scripting Basics/005 Logic Control (OBJ 2.3).srt
8.2 KB
10 - Scripting Basics/006 Data Structures (OBJ 2.3).mp4
42.37 MB
10 - Scripting Basics/006 Data Structures (OBJ 2.3).srt
22.73 KB
10 - Scripting Basics/007 Object Oriented Programming (OBJ 2.3).mp4
37.28 MB
10 - Scripting Basics/007 Object Oriented Programming (OBJ 2.3).srt
13.28 KB
10 - Scripting Basics/008 Checkpoint Scripting Basics.html
12.04 KB
11 - Modifying Scripts/001 Modifying Scripts (OBJ 2.3).mp4
9.72 MB
11 - Modifying Scripts/001 Modifying Scripts (OBJ 2.3).srt
5.75 KB
11 - Modifying Scripts/002 Bash Fundamentals (OBJ 2.3).mp4
39.86 MB
11 - Modifying Scripts/002 Bash Fundamentals (OBJ 2.3).srt
36.87 KB
11 - Modifying Scripts/003 Understanding a Bash Script (OBJ 2.3).mp4
10.14 MB
11 - Modifying Scripts/003 Understanding a Bash Script (OBJ 2.3).srt
8.43 KB
11 - Modifying Scripts/004 Modifying a Bash Script (OBJ 2.3).mp4
26.48 MB
11 - Modifying Scripts/004 Modifying a Bash Script (OBJ 2.3).srt
13.85 KB
11 - Modifying Scripts/005 PowerShell Fundamentals (OBJ 2.3).mp4
24.3 MB
11 - Modifying Scripts/005 PowerShell Fundamentals (OBJ 2.3).srt
26.21 KB
11 - Modifying Scripts/006 Understanding a PowerShell Script (OBJ 2.3).mp4
10.07 MB
11 - Modifying Scripts/006 Understanding a PowerShell Script (OBJ 2.3).srt
6.56 KB
11 - Modifying Scripts/007 Modifying a PowerShell Script (OBJ 2.3).mp4
17.94 MB
11 - Modifying Scripts/007 Modifying a PowerShell Script (OBJ 2.3).srt
13.89 KB
11 - Modifying Scripts/008 Python Fundamentals (OBJ 2.3).mp4
60.6 MB
11 - Modifying Scripts/008 Python Fundamentals (OBJ 2.3).srt
37.52 KB
11 - Modifying Scripts/009 Understanding a Python Script (OBJ 2.3).mp4
8.95 MB
11 - Modifying Scripts/009 Understanding a Python Script (OBJ 2.3).srt
7.7 KB
11 - Modifying Scripts/010 Modifying a Python Script (OBJ 2.3).mp4
17.27 MB
11 - Modifying Scripts/010 Modifying a Python Script (OBJ 2.3).srt
9.12 KB
11 - Modifying Scripts/011 Checkpoint Modifying Scripts.html
12.05 KB
12 - Analyzing Scans/001 Analyzing Scans (OBJ 3.2, 4.1).mp4
14.3 MB
12 - Analyzing Scans/001 Analyzing Scans (OBJ 3.2, 4.1).srt
6.25 KB
12 - Analyzing Scans/002 Positive and Negative Results (OBJ 3.2).mp4
9.37 MB
12 - Analyzing Scans/002 Positive and Negative Results (OBJ 3.2).srt
8.49 KB
12 - Analyzing Scans/003 Validating Scan Results (OBJ 3.2).mp4
19.78 MB
12 - Analyzing Scans/003 Validating Scan Results (OBJ 3.2).srt
7.41 KB
12 - Analyzing Scans/004 Using CVEs and CVSS (OBJ 4.1).mp4
19.86 MB
12 - Analyzing Scans/004 Using CVEs and CVSS (OBJ 4.1).srt
12.51 KB
12 - Analyzing Scans/005 Exploit Prediction Scoring System (OBJ 4.1).mp4
16.25 MB
12 - Analyzing Scans/005 Exploit Prediction Scoring System (OBJ 4.1).srt
7.06 KB
12 - Analyzing Scans/006 Target Prioritization (OBJ 4.1).mp4
17.38 MB
12 - Analyzing Scans/006 Target Prioritization (OBJ 4.1).srt
7.49 KB
12 - Analyzing Scans/007 Common Target Criteria (OBJ 4.1).mp4
22.97 MB
12 - Analyzing Scans/007 Common Target Criteria (OBJ 4.1).srt
7.51 KB
12 - Analyzing Scans/008 Scripting for Result Validation (OBJ 3.2).mp4
9.27 MB
12 - Analyzing Scans/008 Scripting for Result Validation (OBJ 3.2).srt
5.7 KB
12 - Analyzing Scans/009 Scan Validations (OBJ 3.2).mp4
31.08 MB
12 - Analyzing Scans/009 Scan Validations (OBJ 3.2).srt
7.23 KB
12 - Analyzing Scans/010 Capability Selection (OBJ 3.2, 4.1).mp4
10.72 MB
12 - Analyzing Scans/010 Capability Selection (OBJ 3.2, 4.1).srt
8.85 KB
12 - Analyzing Scans/011 Documenting the Attack (OBJ 4.1).mp4
12.59 MB
12 - Analyzing Scans/011 Documenting the Attack (OBJ 4.1).srt
11.27 KB
12 - Analyzing Scans/012 Other Attack Considerations (OBJ 4.1).mp4
43.06 MB
12 - Analyzing Scans/012 Other Attack Considerations (OBJ 4.1).srt
8.74 KB
12 - Analyzing Scans/013 Checkpoint Analyzing Scans.html
11.87 KB
13 - Discovering Vulnerabilities/001 Discovering Vulnerabilities (OBJ 3.1).mp4
10.04 MB
13 - Discovering Vulnerabilities/001 Discovering Vulnerabilities (OBJ 3.1).srt
5.43 KB
13 - Discovering Vulnerabilities/002 Application Scanning (OBJ 3.1).mp4
31.6 MB
13 - Discovering Vulnerabilities/002 Application Scanning (OBJ 3.1).srt
8.93 KB
13 - Discovering Vulnerabilities/003 Software Analysis (OBJ 3.1).mp4
26.38 MB
13 - Discovering Vulnerabilities/003 Software Analysis (OBJ 3.1).srt
10.22 KB
13 - Discovering Vulnerabilities/004 Host-Based Scanning (OBJ 3.1).mp4
26.68 MB
13 - Discovering Vulnerabilities/004 Host-Based Scanning (OBJ 3.1).srt
8.73 KB
13 - Discovering Vulnerabilities/005 Network Scanning (OBJ 3.1).mp4
18 MB
13 - Discovering Vulnerabilities/005 Network Scanning (OBJ 3.1).srt
9.79 KB
13 - Discovering Vulnerabilities/006 Mobile Scanning (OBJ 3.1).mp4
11.9 MB
13 - Discovering Vulnerabilities/006 Mobile Scanning (OBJ 3.1).srt
5.95 KB
13 - Discovering Vulnerabilities/007 Container Scanning (OBJ 3.1).mp4
22.4 MB
13 - Discovering Vulnerabilities/007 Container Scanning (OBJ 3.1).srt
8.99 KB
13 - Discovering Vulnerabilities/008 Scanning IaC (OBJ 3.1).mp4
29.47 MB
13 - Discovering Vulnerabilities/008 Scanning IaC (OBJ 3.1).srt
10.25 KB
13 - Discovering Vulnerabilities/009 ICS Vulnerability Discovery (OBJ 3.1).mp4
16.31 MB
13 - Discovering Vulnerabilities/009 ICS Vulnerability Discovery (OBJ 3.1).srt
10.38 KB
13 - Discovering Vulnerabilities/010 Wireless Scans (OBJ 3.1).mp4
14.73 MB
13 - Discovering Vulnerabilities/010 Wireless Scans (OBJ 3.1).srt
9.29 KB
13 - Discovering Vulnerabilities/011 Static Code Analysis (SonarQube) (OBJ 3.1).mp4
21.21 MB
13 - Discovering Vulnerabilities/011 Static Code Analysis (SonarQube) (OBJ 3.1).srt
11.51 KB
13 - Discovering Vulnerabilities/012 Checkpoint Discovering Vulnerabilities.html
12.33 KB
14 - Vulnerability Discovery Tools/001 Vulnerability Discovery Tools (OBJ 3.1).mp4
6.78 MB
14 - Vulnerability Discovery Tools/001 Vulnerability Discovery Tools (OBJ 3.1).srt
5.07 KB
14 - Vulnerability Discovery Tools/002 Nikto (OBJ 3.1).mp4
66.74 MB
14 - Vulnerability Discovery Tools/002 Nikto (OBJ 3.1).srt
10.79 KB
14 - Vulnerability Discovery Tools/003 GreenboneOpenVAS (OBJ 3.1).mp4
79.99 MB
14 - Vulnerability Discovery Tools/003 GreenboneOpenVAS (OBJ 3.1).srt
28.46 KB
14 - Vulnerability Discovery Tools/004 Trivy (OBJ 3.1).mp4
18.55 MB
14 - Vulnerability Discovery Tools/004 Trivy (OBJ 3.1).srt
7.22 KB
14 - Vulnerability Discovery Tools/005 BloodHound (OBJ 3.1).mp4
28.15 MB
14 - Vulnerability Discovery Tools/005 BloodHound (OBJ 3.1).srt
11.83 KB
14 - Vulnerability Discovery Tools/006 PowerSploit (OBJ 3.1).mp4
3.52 MB
14 - Vulnerability Discovery Tools/006 PowerSploit (OBJ 3.1).srt
3.19 KB
14 - Vulnerability Discovery Tools/007 Grype (OBJ 3.1).mp4
6.68 MB
14 - Vulnerability Discovery Tools/007 Grype (OBJ 3.1).srt
5.96 KB
14 - Vulnerability Discovery Tools/008 Kube-Hunter (OBJ 3.1).mp4
25.14 MB
14 - Vulnerability Discovery Tools/008 Kube-Hunter (OBJ 3.1).srt
6.18 KB
14 - Vulnerability Discovery Tools/009 TruffleHog (OBJ 3.1).mp4
16.75 MB
14 - Vulnerability Discovery Tools/009 TruffleHog (OBJ 3.1).srt
6.3 KB
14 - Vulnerability Discovery Tools/010 Checkpoint Vulnerability Discovery Tools.html
12.04 KB
15 - Social Engineering Attacks/001 Social Engineering Attacks (OBJ 4.8).mp4
19.63 MB
15 - Social Engineering Attacks/001 Social Engineering Attacks (OBJ 4.8).srt
7.25 KB
15 - Social Engineering Attacks/002 Methods of Influence (OBJ 4.8).mp4
81.54 MB
15 - Social Engineering Attacks/002 Methods of Influence (OBJ 4.8).srt
25.93 KB
15 - Social Engineering Attacks/003 Phishing Campaigns (OBJ 4.8).mp4
34.24 MB
15 - Social Engineering Attacks/003 Phishing Campaigns (OBJ 4.8).srt
10.2 KB
15 - Social Engineering Attacks/004 Using the Social Engineering Toolkit (SET) (OBJ 4.8).mp4
39.13 MB
15 - Social Engineering Attacks/004 Using the Social Engineering Toolkit (SET) (OBJ 4.8).srt
28.69 KB
15 - Social Engineering Attacks/005 Gophish (OBJ 4.8).mp4
16.96 MB
15 - Social Engineering Attacks/005 Gophish (OBJ 4.8).srt
11.26 KB
15 - Social Engineering Attacks/006 Impersonation (OBJ 4.8).mp4
41.34 MB
15 - Social Engineering Attacks/006 Impersonation (OBJ 4.8).srt
9.85 KB
15 - Social Engineering Attacks/007 Surveillance Techniques (OBJ 4.8).mp4
16.54 MB
15 - Social Engineering Attacks/007 Surveillance Techniques (OBJ 4.8).srt
6.42 KB
15 - Social Engineering Attacks/008 Watering Hole (OBJ 4.8).mp4
9.69 MB
15 - Social Engineering Attacks/008 Watering Hole (OBJ 4.8).srt
6.79 KB
15 - Social Engineering Attacks/009 Evilginx (OBJ 4.8).mp4
31.69 MB
15 - Social Engineering Attacks/009 Evilginx (OBJ 4.8).srt
9.64 KB
15 - Social Engineering Attacks/010 Tailgating and Piggybacking (OBJ 4.8).mp4
23.23 MB
15 - Social Engineering Attacks/010 Tailgating and Piggybacking (OBJ 4.8).srt
8.38 KB
15 - Social Engineering Attacks/011 Browser Exploitation Framework (BeEF) (OBJ 4.8).mp4
20.43 MB
15 - Social Engineering Attacks/011 Browser Exploitation Framework (BeEF) (OBJ 4.8).srt
6.77 KB
15 - Social Engineering Attacks/012 Checkpoint Social Engineering Attacks.html
12 KB
16 - Wireless Attacks/001 Wireless Attacks (OBJ 4.7).mp4
12.18 MB
16 - Wireless Attacks/001 Wireless Attacks (OBJ 4.7).srt
5.91 KB
16 - Wireless Attacks/002 Wireless Security (OBJ 4.7).mp4
114.67 MB
16 - Wireless Attacks/002 Wireless Security (OBJ 4.7).srt
33.85 KB
16 - Wireless Attacks/003 Wireless Signal Exploitation (OBJ 4.7).mp4
31.55 MB
16 - Wireless Attacks/003 Wireless Signal Exploitation (OBJ 4.7).srt
9.03 KB
16 - Wireless Attacks/004 Aircrack-ng (OBJ 4.7).mp4
25.41 MB
16 - Wireless Attacks/004 Aircrack-ng (OBJ 4.7).srt
9.13 KB
16 - Wireless Attacks/005 Wireless Hacking (OBJ 4.7).mp4
55.95 MB
16 - Wireless Attacks/005 Wireless Hacking (OBJ 4.7).srt
16.94 KB
16 - Wireless Attacks/006 WPS PIN Attacks (OBJ 4.7).mp4
132 MB
16 - Wireless Attacks/006 WPS PIN Attacks (OBJ 4.7).srt
23.61 KB
16 - Wireless Attacks/007 Captive Portal Attacks (OBJ 4.7).mp4
32.95 MB
16 - Wireless Attacks/007 Captive Portal Attacks (OBJ 4.7).srt
10.06 KB
16 - Wireless Attacks/008 Evil Twin (OBJ 4.7).mp4
9.97 MB
16 - Wireless Attacks/008 Evil Twin (OBJ 4.7).srt
5.19 KB
16 - Wireless Attacks/009 Kismet (OBJ 4.7).mp4
27.81 MB
16 - Wireless Attacks/009 Kismet (OBJ 4.7).srt
7.02 KB
16 - Wireless Attacks/010 Wi-Fi Protocol Fuzzing (OBJ 4.7).mp4
22.52 MB
16 - Wireless Attacks/010 Wi-Fi Protocol Fuzzing (OBJ 4.7).srt
9.11 KB
16 - Wireless Attacks/011 Checkpoint Wireless Attacks.html
11.98 KB
17 - Network Attacks/001 Network Attacks (OBJ 4.2, 4.3, 4.5).mp4
23.19 MB
17 - Network Attacks/001 Network Attacks (OBJ 4.2, 4.3, 4.5).srt
7.96 KB
17 - Network Attacks/002 Stress Testing (OBJ 4.2).mp4
36.35 MB
17 - Network Attacks/002 Stress Testing (OBJ 4.2).srt
13.63 KB
17 - Network Attacks/003 Bypassing Segmentation (OBJ 4.2).mp4
31.42 MB
17 - Network Attacks/003 Bypassing Segmentation (OBJ 4.2).srt
10.18 KB
17 - Network Attacks/004 MAC Spoofing (OBJ 4.2).mp4
38.68 MB
17 - Network Attacks/004 MAC Spoofing (OBJ 4.2).srt
10.49 KB
17 - Network Attacks/005 NAC Bypass (OBJ 4.2).mp4
30.16 MB
17 - Network Attacks/005 NAC Bypass (OBJ 4.2).srt
10.3 KB
17 - Network Attacks/006 Session-Based Attacks (OBJ 4.2).mp4
9.47 MB
17 - Network Attacks/006 Session-Based Attacks (OBJ 4.2).srt
7.58 KB
17 - Network Attacks/007 Service Exploitation (OBJ 4.2).mp4
20.41 MB
17 - Network Attacks/007 Service Exploitation (OBJ 4.2).srt
10.12 KB
17 - Network Attacks/008 Packet Crafting (OBJ 4.2).mp4
19.31 MB
17 - Network Attacks/008 Packet Crafting (OBJ 4.2).srt
8.66 KB
17 - Network Attacks/009 Netcat (OBJ 4.2).mp4
33 MB
17 - Network Attacks/009 Netcat (OBJ 4.2).srt
15.11 KB
17 - Network Attacks/010 Using Netcat (OBJ 4.2).mp4
24.21 MB
17 - Network Attacks/010 Using Netcat (OBJ 4.2).srt
21.85 KB
17 - Network Attacks/011 Default Network Credentials (OBJ 4.2).mp4
28.37 MB
17 - Network Attacks/011 Default Network Credentials (OBJ 4.2).srt
9.53 KB
17 - Network Attacks/012 LLMNRNBT-NS Poisoning (OBJ 4.2).mp4
16.09 MB
17 - Network Attacks/012 LLMNRNBT-NS Poisoning (OBJ 4.2).srt
8.89 KB
17 - Network Attacks/013 ARP Poisoning (OBJ 4.2).mp4
34.16 MB
17 - Network Attacks/013 ARP Poisoning (OBJ 4.2).srt
14.54 KB
17 - Network Attacks/014 Intro to Metasploit (OBJ 4.2).mp4
17.89 MB
17 - Network Attacks/014 Intro to Metasploit (OBJ 4.2).srt
9.37 KB
17 - Network Attacks/015 Checkpoint Network Attacks.html
11.55 KB
18 - Authentication Attacks/001 Authentication Attacks (OBJ 4.2, 4.3, 4.5).mp4
41.32 MB
18 - Authentication Attacks/001 Authentication Attacks (OBJ 4.2, 4.3, 4.5).srt
6.89 KB
18 - Authentication Attacks/002 Types of Password Attack (OBJ 4.3).mp4
7.59 MB
18 - Authentication Attacks/002 Types of Password Attack (OBJ 4.3).srt
7.22 KB
18 - Authentication Attacks/003 Password Cracking Tools (OBJ 4.3).mp4
72.14 MB
18 - Authentication Attacks/003 Password Cracking Tools (OBJ 4.3).srt
15.12 KB
18 - Authentication Attacks/004 Credential Attacks (OBJ 4.3).mp4
28.2 MB
18 - Authentication Attacks/004 Credential Attacks (OBJ 4.3).srt
13.26 KB
18 - Authentication Attacks/005 Credential Passing Attacks (OBJ 4.3).mp4
23.14 MB
18 - Authentication Attacks/005 Credential Passing Attacks (OBJ 4.3).srt
8.37 KB
18 - Authentication Attacks/006 Directory Service Attacks (OBJ 4.2, 4.3).mp4
19.32 MB
18 - Authentication Attacks/006 Directory Service Attacks (OBJ 4.2, 4.3).srt
7.21 KB
18 - Authentication Attacks/007 CrackMapExec (CME) (OBJ 4.3).mp4
16.73 MB
18 - Authentication Attacks/007 CrackMapExec (CME) (OBJ 4.3).srt
4.3 KB
18 - Authentication Attacks/008 SAML Attacks (OBJ 4.3).mp4
24.43 MB
18 - Authentication Attacks/008 SAML Attacks (OBJ 4.3).srt
9.65 KB
18 - Authentication Attacks/009 OpenID Connect (OIDC) Attacks (OBJ 4.3).mp4
15.36 MB
18 - Authentication Attacks/009 OpenID Connect (OIDC) Attacks (OBJ 4.3).srt
10.34 KB
18 - Authentication Attacks/010 Hash Attacks (OBJ 4.5).mp4
17.62 MB
18 - Authentication Attacks/010 Hash Attacks (OBJ 4.5).srt
7.25 KB
18 - Authentication Attacks/011 Checkpoint Authentication Attacks.html
12.24 KB
19 - Host Attacks/001 Host Attacks (OBJ 4.4).mp4
14.93 MB
19 - Host Attacks/001 Host Attacks (OBJ 4.4).srt
6.99 KB
19 - Host Attacks/002 Privilege Escalation (OBJ 4.4).mp4
35.35 MB
19 - Host Attacks/002 Privilege Escalation (OBJ 4.4).srt
12.47 KB
19 - Host Attacks/003 Conducting Privilege Escalation (OBJ 4.4).mp4
179.48 MB
19 - Host Attacks/003 Conducting Privilege Escalation (OBJ 4.4).srt
28.78 KB
19 - Host Attacks/004 Credential Harvesting (OBJ 4.4).mp4
13.59 MB
19 - Host Attacks/004 Credential Harvesting (OBJ 4.4).srt
7.67 KB
19 - Host Attacks/005 Misconfigured Endpoints (OBJ 4.4).mp4
18.17 MB
19 - Host Attacks/005 Misconfigured Endpoints (OBJ 4.4).srt
7.01 KB
19 - Host Attacks/006 Unquoted Service Paths (OBJ 4.4).mp4
16.65 MB
19 - Host Attacks/006 Unquoted Service Paths (OBJ 4.4).srt
7.55 KB
19 - Host Attacks/007 Disabling Security Software (OBJ 4.4).mp4
31.35 MB
19 - Host Attacks/007 Disabling Security Software (OBJ 4.4).srt
10.35 KB
19 - Host Attacks/008 Payload Obfuscation (OBJ 4.4).mp4
12.72 MB
19 - Host Attacks/008 Payload Obfuscation (OBJ 4.4).srt
7.6 KB
19 - Host Attacks/009 User-Controlled Access Bypass (OBJ 4.4).mp4
64.29 MB
19 - Host Attacks/009 User-Controlled Access Bypass (OBJ 4.4).srt
12.95 KB
19 - Host Attacks/010 Shell and Kiosk Escapes (OBJ 4.4).mp4
21.86 MB
19 - Host Attacks/010 Shell and Kiosk Escapes (OBJ 4.4).srt
7.11 KB
19 - Host Attacks/011 Library and Process Injection (OBJ 4.4).mp4
70.15 MB
19 - Host Attacks/011 Library and Process Injection (OBJ 4.4).srt
12.59 KB
19 - Host Attacks/012 Log Tampering (OBJ 4.4).mp4
6.53 MB
19 - Host Attacks/012 Log Tampering (OBJ 4.4).srt
5.82 KB
19 - Host Attacks/013 Living Off the Land (OBJ 4.4).mp4
6.58 MB
19 - Host Attacks/013 Living Off the Land (OBJ 4.4).srt
6.67 KB
19 - Host Attacks/014 Checkpoint Host Attacks.html
12.33 KB
20 - Web Application Vulnerabilities/001 Web Application Vulnerabilities (OBJ 4.3, 4.5).mp4
33.18 MB
20 - Web Application Vulnerabilities/001 Web Application Vulnerabilities (OBJ 4.3, 4.5).srt
6.33 KB
20 - Web Application Vulnerabilities/002 Race Conditions (OBJ 4.5).mp4
23.56 MB
20 - Web Application Vulnerabilities/002 Race Conditions (OBJ 4.5).srt
10.62 KB
20 - Web Application Vulnerabilities/003 Buffer Overflows (OBJ 4.5).mp4
63.76 MB
20 - Web Application Vulnerabilities/003 Buffer Overflows (OBJ 4.5).srt
27.01 KB
20 - Web Application Vulnerabilities/004 Buffer Overflow Attacks (OBJ 4.5).mp4
27.62 MB
20 - Web Application Vulnerabilities/004 Buffer Overflow Attacks (OBJ 4.5).srt
12.75 KB
20 - Web Application Vulnerabilities/005 Authentication Flaws and Insecure References (OBJ 4.5).mp4
39.61 MB
20 - Web Application Vulnerabilities/005 Authentication Flaws and Insecure References (OBJ 4.5).srt
12.14 KB
20 - Web Application Vulnerabilities/006 Improper Error Handling (OBJ 4.5).mp4
15.25 MB
20 - Web Application Vulnerabilities/006 Improper Error Handling (OBJ 4.5).srt
11.66 KB
20 - Web Application Vulnerabilities/007 Improper Headers (OBJ 4.5).mp4
25.59 MB
20 - Web Application Vulnerabilities/007 Improper Headers (OBJ 4.5).srt
12.28 KB
20 - Web Application Vulnerabilities/008 Code Signing (OBJ 4.5).mp4
13.73 MB
20 - Web Application Vulnerabilities/008 Code Signing (OBJ 4.5).srt
4.25 KB
20 - Web Application Vulnerabilities/009 Vulnerable Components (OBJ 4.5).mp4
88.83 MB
20 - Web Application Vulnerabilities/009 Vulnerable Components (OBJ 4.5).srt
23.96 KB
20 - Web Application Vulnerabilities/010 Software Composition (OBJ 4.5).mp4
87.67 MB
20 - Web Application Vulnerabilities/010 Software Composition (OBJ 4.5).srt
20.86 KB
20 - Web Application Vulnerabilities/011 Checkpoint Web Application Vulnerabilities.html
12.05 KB
21 - Web Application Attacks/001 Web Application Attacks (OBJ 4.5).mp4
74.04 MB
21 - Web Application Attacks/001 Web Application Attacks (OBJ 4.5).srt
6.92 KB
21 - Web Application Attacks/002 Directory Traversals (OBJ 4.5).mp4
43.03 MB
21 - Web Application Attacks/002 Directory Traversals (OBJ 4.5).srt
18.43 KB
21 - Web Application Attacks/003 Directory Traversal Tools (OBJ 4.5).mp4
40.38 MB
21 - Web Application Attacks/003 Directory Traversal Tools (OBJ 4.5).srt
20.68 KB
21 - Web Application Attacks/004 Cross-Site Scripting (XSS) (OBJ 4.5).mp4
19.35 MB
21 - Web Application Attacks/004 Cross-Site Scripting (XSS) (OBJ 4.5).srt
19.58 KB
21 - Web Application Attacks/005 Request Forgeries (OBJ 4.5).mp4
21.09 MB
21 - Web Application Attacks/005 Request Forgeries (OBJ 4.5).srt
8.11 KB
21 - Web Application Attacks/006 SQL Injections (OBJ 4.5).mp4
37.2 MB
21 - Web Application Attacks/006 SQL Injections (OBJ 4.5).srt
14.37 KB
21 - Web Application Attacks/007 Performing SQL Injection Attacks (OBJ 4.3, 4.5).mp4
72.18 MB
21 - Web Application Attacks/007 Performing SQL Injection Attacks (OBJ 4.3, 4.5).srt
18.25 KB
21 - Web Application Attacks/008 Injection Attacks (OBJ 4.5).mp4
13.11 MB
21 - Web Application Attacks/008 Injection Attacks (OBJ 4.5).srt
9.97 KB
21 - Web Application Attacks/009 File Inclusions (OBJ 4.5).mp4
9.61 MB
21 - Web Application Attacks/009 File Inclusions (OBJ 4.5).srt
7.71 KB
21 - Web Application Attacks/010 Arbitrary Code Execution (OBJ 4.5).mp4
31.29 MB
21 - Web Application Attacks/010 Arbitrary Code Execution (OBJ 4.5).srt
8.18 KB
21 - Web Application Attacks/011 Web Application Session Hijacking (OBJ 4.5).mp4
31.7 MB
21 - Web Application Attacks/011 Web Application Session Hijacking (OBJ 4.5).srt
8.18 KB
21 - Web Application Attacks/012 Abusing APIs (OBJ 4.5).mp4
38.24 MB
21 - Web Application Attacks/012 Abusing APIs (OBJ 4.5).srt
13.67 KB
21 - Web Application Attacks/013 OWASP ZAP (OBJ 4.5).mp4
23.84 MB
21 - Web Application Attacks/013 OWASP ZAP (OBJ 4.5).srt
8.9 KB
21 - Web Application Attacks/014 Attacking Web Applications (OBJ 4.5).mp4
145.48 MB
21 - Web Application Attacks/014 Attacking Web Applications (OBJ 4.5).srt
31.34 KB
21 - Web Application Attacks/015 Checkpoint Web Application Attacks.html
12.33 KB
22 - Cloud Attacks/001 Cloud Attacks (OBJ 4.6 ).mp4
9.74 MB
22 - Cloud Attacks/001 Cloud Attacks (OBJ 4.6 ).srt
6.59 KB
22 - Cloud Attacks/002 Identity and Access Management (IAM) Misconfigurations (OBJ 4.6 ).mp4
28.39 MB
22 - Cloud Attacks/002 Identity and Access Management (IAM) Misconfigurations (OBJ 4.6 ).srt
8.38 KB
22 - Cloud Attacks/003 Resource Misconfigurations (OBJ 4.6 ).mp4
35.05 MB
22 - Cloud Attacks/003 Resource Misconfigurations (OBJ 4.6 ).srt
9.79 KB
22 - Cloud Attacks/004 Logging Information Exposures (OBJ 4.6 ).mp4
27.04 MB
22 - Cloud Attacks/004 Logging Information Exposures (OBJ 4.6 ).srt
9.57 KB
22 - Cloud Attacks/005 Metadata Service Attacks (OBJ 4.6 ).mp4
46.7 MB
22 - Cloud Attacks/005 Metadata Service Attacks (OBJ 4.6 ).srt
11.15 KB
22 - Cloud Attacks/006 Image and Artifact Tampering (OBJ 4.6 ).mp4
41.79 MB
22 - Cloud Attacks/006 Image and Artifact Tampering (OBJ 4.6 ).srt
11.28 KB
22 - Cloud Attacks/007 Supply Chain Attacks (OBJ 4.6 ).mp4
48.49 MB
22 - Cloud Attacks/007 Supply Chain Attacks (OBJ 4.6 ).srt
9.04 KB
22 - Cloud Attacks/008 Container Exploits and Attacks (OBJ 4.6 ).mp4
25.14 MB
22 - Cloud Attacks/008 Container Exploits and Attacks (OBJ 4.6 ).srt
7.7 KB
22 - Cloud Attacks/009 Trust Relationship Abuse (OBJ 4.6 ).mp4
39.63 MB
22 - Cloud Attacks/009 Trust Relationship Abuse (OBJ 4.6 ).srt
12.94 KB
22 - Cloud Attacks/010 Third-party Integration Exploits (OBJ 4.6 ).mp4
56.58 MB
22 - Cloud Attacks/010 Third-party Integration Exploits (OBJ 4.6 ).srt
10.56 KB
22 - Cloud Attacks/011 Cloud Security Testing (OBJ 4.6 ).mp4
34.76 MB
22 - Cloud Attacks/011 Cloud Security Testing (OBJ 4.6 ).srt
11.16 KB
22 - Cloud Attacks/012 Conducting Cloud Audits (OBJ 4.6 ).mp4
86.18 MB
22 - Cloud Attacks/012 Conducting Cloud Audits (OBJ 4.6 ).srt
27.73 KB
22 - Cloud Attacks/013 Checkpoint Cloud Attacks.html
12.36 KB
23 - Attacking Specialized Systems/001 Attacking Specialized Systems (OBJ 4.9).mp4
8.52 MB
23 - Attacking Specialized Systems/001 Attacking Specialized Systems (OBJ 4.9).srt
5.55 KB
23 - Attacking Specialized Systems/002 Mobile Device Attacks (OBJ 4.9).mp4
82.7 MB
23 - Attacking Specialized Systems/002 Mobile Device Attacks (OBJ 4.9).srt
25.66 KB
23 - Attacking Specialized Systems/003 Tools for Mobile Device Attacks (OBJ 4.9).mp4
30.77 MB
23 - Attacking Specialized Systems/003 Tools for Mobile Device Attacks (OBJ 4.9).srt
10 KB
23 - Attacking Specialized Systems/004 Bluetooth Attacks (OBJ 4.9).mp4
11.13 MB
23 - Attacking Specialized Systems/004 Bluetooth Attacks (OBJ 4.9).srt
5.5 KB
23 - Attacking Specialized Systems/005 NFC and RFID Attacks (OBJ 4.9).mp4
17.23 MB
23 - Attacking Specialized Systems/005 NFC and RFID Attacks (OBJ 4.9).srt
9.93 KB
23 - Attacking Specialized Systems/006 AI Attacks (OBJ 4.9).mp4
39.86 MB
23 - Attacking Specialized Systems/006 AI Attacks (OBJ 4.9).srt
9.02 KB
23 - Attacking Specialized Systems/007 Operational Technology (OT) (OBJ 4.9).mp4
32.36 MB
23 - Attacking Specialized Systems/007 Operational Technology (OT) (OBJ 4.9).srt
20.85 KB
23 - Attacking Specialized Systems/008 OT Attacks (OBJ 4.9).mp4
81.29 MB
23 - Attacking Specialized Systems/008 OT Attacks (OBJ 4.9).srt
24.97 KB
23 - Attacking Specialized Systems/009 Testing OT Systems (OBJ 4.9).mp4
12.31 MB
23 - Attacking Specialized Systems/009 Testing OT Systems (OBJ 4.9).srt
6.76 KB
23 - Attacking Specialized Systems/010 Checkpoint Attacking Specialized Systems.html
12.58 KB
24 - Automated Attacks/001 Automated Attacks (OBJ 4.10).mp4
13.27 MB
24 - Automated Attacks/001 Automated Attacks (OBJ 4.10).srt
5.9 KB
24 - Automated Attacks/002 Automating Attacks with Bash (OBJ 4.10).mp4
11.54 MB
24 - Automated Attacks/002 Automating Attacks with Bash (OBJ 4.10).srt
7.01 KB
24 - Automated Attacks/003 EmpirePowerSploit (OBJ 4.10).mp4
21.02 MB
24 - Automated Attacks/003 EmpirePowerSploit (OBJ 4.10).srt
8.96 KB
24 - Automated Attacks/004 PowerView (OBJ 4.10).mp4
7.1 MB
24 - Automated Attacks/004 PowerView (OBJ 4.10).srt
7.98 KB
24 - Automated Attacks/005 PowerUpSQL (OBJ 4.10).mp4
33.88 MB
24 - Automated Attacks/005 PowerUpSQL (OBJ 4.10).srt
10.63 KB
24 - Automated Attacks/006 AD Search (OBJ 4.10).mp4
22.41 MB
24 - Automated Attacks/006 AD Search (OBJ 4.10).srt
9.45 KB
24 - Automated Attacks/007 Impacket (OBJ 4.10).mp4
13.03 MB
24 - Automated Attacks/007 Impacket (OBJ 4.10).srt
6.22 KB
24 - Automated Attacks/008 Scapy (OBJ 4.10).mp4
28.52 MB
24 - Automated Attacks/008 Scapy (OBJ 4.10).srt
11.62 KB
24 - Automated Attacks/009 Caldera (OBJ 4.10).mp4
34.73 MB
24 - Automated Attacks/009 Caldera (OBJ 4.10).srt
7.87 KB
24 - Automated Attacks/010 Infection Monkey (OBJ 4.10).mp4
19.69 MB
24 - Automated Attacks/010 Infection Monkey (OBJ 4.10).srt
6.17 KB
24 - Automated Attacks/011 Atomic Red Team (OBJ 4.10).mp4
12.07 MB
24 - Automated Attacks/011 Atomic Red Team (OBJ 4.10).srt
6.99 KB
24 - Automated Attacks/012 Checkpoint Automated Attacks.html
12.09 KB
25 - Persistence/001 Persistence (OBJ 5.1).mp4
15.22 MB
25 - Persistence/001 Persistence (OBJ 5.1).srt
5.29 KB
25 - Persistence/002 Command and Control (OBJ 5.1).mp4
11.48 MB
25 - Persistence/002 Command and Control (OBJ 5.1).srt
6.8 KB
25 - Persistence/003 Automating Persistence (OBJ 5.1).mp4
9.86 MB
25 - Persistence/003 Automating Persistence (OBJ 5.1).srt
9.68 KB
25 - Persistence/004 Remote Shells (OBJ 5.1).mp4
14.65 MB
25 - Persistence/004 Remote Shells (OBJ 5.1).srt
6.53 KB
25 - Persistence/005 Using Remote Shells (OBJ 5.1).mp4
20.26 MB
25 - Persistence/005 Using Remote Shells (OBJ 5.1).srt
8.46 KB
25 - Persistence/006 Backdoor (OBJ 5.1).mp4
25.69 MB
25 - Persistence/006 Backdoor (OBJ 5.1).srt
11.62 KB
25 - Persistence/007 Remote Access Trojans (OBJ 5.1).mp4
13.7 MB
25 - Persistence/007 Remote Access Trojans (OBJ 5.1).srt
9.4 KB
25 - Persistence/008 Account Credentials (OBJ 5.1).mp4
32.12 MB
25 - Persistence/008 Account Credentials (OBJ 5.1).srt
10.07 KB
25 - Persistence/009 Browser-Based Persistence (OBJ 5.1).mp4
42.74 MB
25 - Persistence/009 Browser-Based Persistence (OBJ 5.1).srt
9.13 KB
25 - Persistence/010 Security Control Tampering (OBJ 5.1).mp4
25.52 MB
25 - Persistence/010 Security Control Tampering (OBJ 5.1).srt
11.67 KB
25 - Persistence/011 Checkpoint Persistence.html
11.9 KB
26 - Lateral Movement/001 Lateral Movement (OBJ 5.2).mp4
18.28 MB
26 - Lateral Movement/001 Lateral Movement (OBJ 5.2).srt
6.32 KB
26 - Lateral Movement/002 Pivoting and Relaying (OBJ 5.2).mp4
16.65 MB
26 - Lateral Movement/002 Pivoting and Relaying (OBJ 5.2).srt
5.57 KB
26 - Lateral Movement/003 Using ProxyChains (OBJ 5.2).mp4
64.8 MB
26 - Lateral Movement/003 Using ProxyChains (OBJ 5.2).srt
13.97 KB
26 - Lateral Movement/004 Enumerating for Lateral Movement (OBJ 5.2).mp4
12.79 MB
26 - Lateral Movement/004 Enumerating for Lateral Movement (OBJ 5.2).srt
6.78 KB
26 - Lateral Movement/005 Service Discovery (OBJ 5.2).mp4
29.62 MB
26 - Lateral Movement/005 Service Discovery (OBJ 5.2).srt
9.31 KB
26 - Lateral Movement/006 Protocol Discovery (OBJ 5.2).mp4
6.94 MB
26 - Lateral Movement/006 Protocol Discovery (OBJ 5.2).srt
6.21 KB
26 - Lateral Movement/007 Remote Access Discovery (OBJ 5.2).mp4
12.77 MB
26 - Lateral Movement/007 Remote Access Discovery (OBJ 5.2).srt
8.08 KB
26 - Lateral Movement/008 Printer Discovery (OBJ 5.2).mp4
12.15 MB
26 - Lateral Movement/008 Printer Discovery (OBJ 5.2).srt
8.32 KB
26 - Lateral Movement/009 Discovering Internal Websites (OBJ 5.2).mp4
40.79 MB
26 - Lateral Movement/009 Discovering Internal Websites (OBJ 5.2).srt
15.03 KB
26 - Lateral Movement/010 Living Off the Land Tools (OBJ 5.2).mp4
23.63 MB
26 - Lateral Movement/010 Living Off the Land Tools (OBJ 5.2).srt
7.44 KB
26 - Lateral Movement/011 sshuttle (OBJ 5.2).mp4
20.59 MB
26 - Lateral Movement/011 sshuttle (OBJ 5.2).srt
7.68 KB
26 - Lateral Movement/012 Covenant (OBJ 5.2).mp4
40.54 MB
26 - Lateral Movement/012 Covenant (OBJ 5.2).srt
8.52 KB
26 - Lateral Movement/013 Checkpoint Lateral Movement.html
11.83 KB
27 - Exfiltration/001 Exfiltration (OBJ 5.3).mp4
7.93 MB
27 - Exfiltration/001 Exfiltration (OBJ 5.3).srt
4.93 KB
27 - Exfiltration/002 Covert Channels (OBJ 5.3).mp4
29.29 MB
27 - Exfiltration/002 Covert Channels (OBJ 5.3).srt
7.27 KB
27 - Exfiltration/003 Steganography (OBJ 5.3).mp4
44.84 MB
27 - Exfiltration/003 Steganography (OBJ 5.3).srt
12.75 KB
27 - Exfiltration/004 Covert Channel Using DNS (OBJ 5.3).mp4
39.08 MB
27 - Exfiltration/004 Covert Channel Using DNS (OBJ 5.3).srt
15.58 KB
27 - Exfiltration/005 Covert Channel Using ICMP (OBJ 5.3).mp4
16.29 MB
27 - Exfiltration/005 Covert Channel Using ICMP (OBJ 5.3).srt
6.93 KB
27 - Exfiltration/006 Covert Channel Using HTTPS (OBJ 5.3).mp4
37.72 MB
27 - Exfiltration/006 Covert Channel Using HTTPS (OBJ 5.3).srt
10.04 KB
27 - Exfiltration/007 Alternate Data Streams (ADS) (OBJ 5.3).mp4
8.5 MB
27 - Exfiltration/007 Alternate Data Streams (ADS) (OBJ 5.3).srt
7.4 KB
27 - Exfiltration/008 Exfiltrating Data (OBJ 5.3).mp4
27.73 MB
27 - Exfiltration/008 Exfiltrating Data (OBJ 5.3).srt
8.71 KB
27 - Exfiltration/009 Checkpoint Exfiltration.html
11.95 KB
28 - Cleanup and Restoration/001 Cleanup and Restoration (OBJ 5.4).mp4
6.45 MB
28 - Cleanup and Restoration/001 Cleanup and Restoration (OBJ 5.4).srt
4.63 KB
28 - Cleanup and Restoration/002 Persistence Removal (OBJ 5.4).mp4
14.97 MB
28 - Cleanup and Restoration/002 Persistence Removal (OBJ 5.4).srt
6.8 KB
28 - Cleanup and Restoration/003 Revert Configuration Changes (OBJ 5.4).mp4
24.16 MB
28 - Cleanup and Restoration/003 Revert Configuration Changes (OBJ 5.4).srt
6.48 KB
28 - Cleanup and Restoration/004 Created Credentials Removal (OBJ 5.4).mp4
8.33 MB
28 - Cleanup and Restoration/004 Created Credentials Removal (OBJ 5.4).srt
5.17 KB
28 - Cleanup and Restoration/005 Removal of Testing Tools (OBJ 5.4).mp4
15.61 MB
28 - Cleanup and Restoration/005 Removal of Testing Tools (OBJ 5.4).srt
4.93 KB
28 - Cleanup and Restoration/006 Decommission Testing Infrastructure (OBJ 5.4).mp4
10.18 MB
28 - Cleanup and Restoration/006 Decommission Testing Infrastructure (OBJ 5.4).srt
6.66 KB
28 - Cleanup and Restoration/007 Artifact Preservation (OBJ 5.4).mp4
7.17 MB
28 - Cleanup and Restoration/007 Artifact Preservation (OBJ 5.4).srt
5.21 KB
28 - Cleanup and Restoration/008 Secure Data Destruction (OBJ 5.4).mp4
15.6 MB
28 - Cleanup and Restoration/008 Secure Data Destruction (OBJ 5.4).srt
5.14 KB
28 - Cleanup and Restoration/009 Checkpoint Cleanup and Restoration.html
12.32 KB
29 - Remediation Recommendations/001 Remediation Recommendations (OBJ 1.5).mp4
11.26 MB
29 - Remediation Recommendations/001 Remediation Recommendations (OBJ 1.5).srt
5.23 KB
29 - Remediation Recommendations/002 System Hardening (OBJ 1.5).mp4
53.25 MB
29 - Remediation Recommendations/002 System Hardening (OBJ 1.5).srt
25.96 KB
29 - Remediation Recommendations/003 User Input Sanitization (OBJ 1.5).mp4
19.61 MB
29 - Remediation Recommendations/003 User Input Sanitization (OBJ 1.5).srt
8.93 KB
29 - Remediation Recommendations/004 Network and Infrastructure Controls (OBJ 1.5).mp4
20.3 MB
29 - Remediation Recommendations/004 Network and Infrastructure Controls (OBJ 1.5).srt
7.97 KB
29 - Remediation Recommendations/005 Authentication Recommendations (OBJ 1.5).mp4
26.06 MB
29 - Remediation Recommendations/005 Authentication Recommendations (OBJ 1.5).srt
9.08 KB
29 - Remediation Recommendations/006 Encryption Recommendations (OBJ 1.5).mp4
24.67 MB
29 - Remediation Recommendations/006 Encryption Recommendations (OBJ 1.5).srt
9.32 KB
29 - Remediation Recommendations/007 Patch Management (OBJ 1.5).mp4
20.28 MB
29 - Remediation Recommendations/007 Patch Management (OBJ 1.5).srt
7.85 KB
29 - Remediation Recommendations/008 Process Level Remediation (OBJ 1.5).mp4
17.88 MB
29 - Remediation Recommendations/008 Process Level Remediation (OBJ 1.5).srt
6.03 KB
29 - Remediation Recommendations/009 Administrative Controls (OBJ 1.5).mp4
101.24 MB
29 - Remediation Recommendations/009 Administrative Controls (OBJ 1.5).srt
31.35 KB
29 - Remediation Recommendations/010 Physical Controls (OBJ 1.5).mp4
42.47 MB
29 - Remediation Recommendations/010 Physical Controls (OBJ 1.5).srt
15.91 KB
29 - Remediation Recommendations/011 Operational Controls and Policies (OBJ 1.5).mp4
22.73 MB
29 - Remediation Recommendations/011 Operational Controls and Policies (OBJ 1.5).srt
6.03 KB
29 - Remediation Recommendations/012 Implementing Recommendations (OBJ 1.5).mp4
22.38 MB
29 - Remediation Recommendations/012 Implementing Recommendations (OBJ 1.5).srt
14.8 KB
29 - Remediation Recommendations/013 Checkpoint Remediation Recommendations.html
12.24 KB
30 - Penetration Test Reporting/001 Penetration Test Reporting (OBJ 1.4).mp4
11.29 MB
30 - Penetration Test Reporting/001 Penetration Test Reporting (OBJ 1.4).srt
5.11 KB
30 - Penetration Test Reporting/002 Executive Summary Process (OBJ 1.4).mp4
14.53 MB
30 - Penetration Test Reporting/002 Executive Summary Process (OBJ 1.4).srt
5.9 KB
30 - Penetration Test Reporting/003 Root Cause Analysis (OBJ 1.4).mp4
31.88 MB
30 - Penetration Test Reporting/003 Root Cause Analysis (OBJ 1.4).srt
8.5 KB
30 - Penetration Test Reporting/004 Report Components (OBJ 1.2, 1.4).mp4
32.45 MB
30 - Penetration Test Reporting/004 Report Components (OBJ 1.2, 1.4).srt
8.83 KB
30 - Penetration Test Reporting/005 Risk Scoring and Prioritization (OBJ 1.4).mp4
25.96 MB
30 - Penetration Test Reporting/005 Risk Scoring and Prioritization (OBJ 1.4).srt
7.05 KB
30 - Penetration Test Reporting/006 Definitions in the Report (OBJ 1.4).mp4
27.56 MB
30 - Penetration Test Reporting/006 Definitions in the Report (OBJ 1.4).srt
6.69 KB
30 - Penetration Test Reporting/007 Limits and Assumptions (OBJ 1.2, 1.4).mp4
33.7 MB
30 - Penetration Test Reporting/007 Limits and Assumptions (OBJ 1.2, 1.4).srt
8.51 KB
30 - Penetration Test Reporting/008 Special Considerations (OBJ 1.2, 1.4).mp4
44.84 MB
30 - Penetration Test Reporting/008 Special Considerations (OBJ 1.2, 1.4).srt
11.05 KB
30 - Penetration Test Reporting/009 Report Analysis Workshop (OBJ 1.4).mp4
28.3 MB
30 - Penetration Test Reporting/009 Report Analysis Workshop (OBJ 1.4).srt
14.56 KB
30 - Penetration Test Reporting/010 Checkpoint Penetration Test Reporting.html
12.65 KB
31 - Conclusion/001 Conclusion.mp4
144.05 MB
31 - Conclusion/001 Conclusion.srt
28.37 KB
31 - Conclusion/002 BONUS What comes next.mp4
64.08 MB
31 - Conclusion/002 BONUS What comes next.srt
7.82 KB
32 - Practice Exam/001 Full-length Practice Exam.html
155.86 KB

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。