Livelessons - Enterprise Penetration Testing and Continuous Monitoring (The Art of Hacking Series)
    
    File List
    
        
            
                
                    - 11.2.1 Understanding the Red Team Environment.mp4  625.0 MB
- 04.1.2 Understanding Enterprise Wide Penetration Testing.mp4  453.3 MB
- 03.1.1 Introducing Red Teams and Enterprise Hacking.mp4  314.5 MB
- 14.3.1 Surveying Social Engineering Methodologies.mp4  231.2 MB
- 33.6.3 Exploring the Hidden Cost of Open Source Software.mp4  222.6 MB
- 37.7.2 Understanding Lateral Movement.mp4  217.5 MB
- 07.1.5 Surveying Operational Processes and Policies for the Red Team.mp4  212.2 MB
- 49.9.1 Understanding the Challenge of Testing Cloud Services.mp4  210.7 MB
- 21.4.4 Exploring How to Automate Scans.mp4  205.7 MB
- 16.3.3 Exploiting Social Engineering Tools.mp4  192.5 MB
- 06.1.4 Exploring How to Plan and Fund a Red Team.mp4  186.0 MB
- 50.9.2 Exploring How to Test in the Cloud.mp4  181.6 MB
- 34.6.4 Learning How to Host Enterprise Capture the Flag Events.mp4  179.4 MB
- 28.5.2 Exploring Web App Testing Essential Tools.mp4  171.7 MB
- 05.1.3 Understanding the Difference Between Red and Blue Teams.mp4  159.5 MB
- 15.3.2 Understanding How to Target Employees.mp4  156.8 MB
- 09.1.7 Understanding Red Team Collaboration.mp4  150.8 MB
- 23.4.6 Exploring Vulnerability Scanners.mp4  149.2 MB
- 45.8.6 Searching for Sensitive Data.mp4  141.6 MB
- 08.1.6 Understanding How to Create and Hire the Red Team.mp4  136.6 MB
- 12.2.2 Understanding Passive Recon.mp4  135.8 MB
- 01.Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking - Introduction.mp4  132.9 MB
- 42.8.3 Understanding How to Compromise User Credentials.mp4  127.8 MB
- 22.4.5 Using Shodan and Its API.mp4  106.2 MB
- 46.8.7 Understanding Data Exfiltration Techniques.mp4  103.1 MB
- 29.5.3 Understanding Enterprise Application Continuous Testing.mp4  94.7 MB
- 54.Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking - Summary.mp4  92.2 MB
- 19.4.2 Understanding the Operational Impact of Enterprise-wide Scanning.mp4  80.1 MB
- 41.8.2 Learning How to Achieve Domain Admin Access.mp4  79.4 MB
- 47.8.8 Understanding How to Cover Your Tracks.mp4  78.2 MB
- 36.7.1 Learning Privilege Escalation Methodologies.mp4  74.1 MB
- 52.10.1 Surveying Final Reports for Transactional Penetration Testing Events.mp4  73.7 MB
- 32.6.2 Understanding What Hosts to Target and the Scope of the Testing.mp4  70.0 MB
- 18.4.1 Exploring Network and Vulnerability Scanning Methodologies.mp4  69.1 MB
- 02.Learning objectives.mp4  67.4 MB
- 38.7.3 Surveying Privilege Escalation Essential Tools.mp4  60.5 MB
- 39.Learning objectives.mp4  55.3 MB
- 43.8.4 Surveying Password Cracking & Reporting.mp4  48.0 MB
- 24.4.7 Understanding Binary and Source Code Scanners.mp4  46.1 MB
- 20.4.3 Understanding Scanning Tools.mp4  45.5 MB
- 17.Learning objectives.mp4  40.4 MB
- 27.5.1 Exploring How to Target Hosts.mp4  40.0 MB
- 25.4.8 Understanding How to Perform Continuous Monitoring.mp4  39.4 MB
- 44.8.5 Understanding That Domain Admin Is Not the End Goal.mp4  36.5 MB
- 35.Learning objectives.mp4  31.6 MB
- 10.Learning objectives.mp4  31.1 MB
- 26.Learning objectives.mp4  29.4 MB
- 53.10.2 Surveying Continouos Reporting for Enterprise Continuous Monitoring.mp4  29.0 MB
- 31.6.1 Understanding How to Initially Get on the Network.mp4  27.5 MB
- 48.Learning objectives.mp4  26.0 MB
- 51.Learning objectives.mp4  24.8 MB
- 13.Learning objectives.mp4  24.1 MB
- 30.Learning objectives.mp4  21.3 MB
- 40.8.1 Understanding Persistent Access.mp4  15.6 MB
- fkSJH.jpg  25.5 KB
- info.txt  6.1 KB
 
    Download Torrent
    
    Related Resources
    
    Copyright Infringement
    
        If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.