Lesson 26 Post-Exploitation Techniques/002. 26.1 Maintaining Persistence After Compromising a System.mp4
30.32 MB
Lesson 26 Post-Exploitation Techniques/003. 26.2 Understanding How to Perform Lateral Movement and Pivoting.mp4
12.84 MB
Lesson 26 Post-Exploitation Techniques/004. 26.3 Understanding How to Cover Your Tracks and Clean up Systems After a Penetration Testing Engagement.mp4
6.41 MB
Lesson 27 Hacking User Credentials/001. Learning objectives.mp4
3.57 MB
Lesson 27 Hacking User Credentials/002. 27.1 Understanding Authentication and Authorization Mechanisms.mp4
21.41 MB
Lesson 27 Hacking User Credentials/003. 27.2 Understanding Authentication and Authorization Attacks.mp4
15.05 MB
Lesson 27 Hacking User Credentials/004. 27.3 Exploring Password Storage Mechanisms.mp4
6.9 MB
Lesson 27 Hacking User Credentials/005. 27.4 Understanding Password Storage Vulnerability.mp4
10.91 MB
Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4
63.03 MB
Lesson 27 Hacking User Credentials/007. 27.6 Cracking Passwords with hashcat.mp4
39.01 MB
Lesson 27 Hacking User Credentials/008. 27.7 Improving Password Security.mp4
7.94 MB
Lesson 28 Reporting and Communication/001. Learning objectives.mp4
2.84 MB
Lesson 28 Reporting and Communication/002. 28.1 Surveying Report Writing and Handling Best Practices.mp4
14.03 MB
Lesson 28 Reporting and Communication/003. 28.2 Recommending Mitigation Strategies for the Discovered Vulnerabilities.mp4
8.58 MB
Lesson 28 Reporting and Communication/004. 28.3 Explaining the Importance of Appropriate Communication.mp4
28.75 MB
Lesson 29 Hacking Mobile Platforms/001. Learning objectives.mp4
2.54 MB
Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4