Filename Size 00 CompTIA PenTest+ (PT0-001).txt 3.1 KB 01 Overview.mp4 44.4 MB 02 Planning an Engagement.mp4 179.1 MB 03 Planning on Engagement Part 2.mp4 174.8 MB 04 Planning an Engagement Part 3.mp4 154.3 MB 05 Planning an Engagement Part 4.mp4 192.6 MB 06 Legal Concepts.mp4 238.8 MB 07 Scoping an Engagement.mp4 178 MB 08 Scoping an Engagement Part 2.mp4 208.2 MB 09 Compliance-Based Assessments.mp4 121.8 MB 10 Pentesting Tools Use Cases.mp4 98.5 MB 11 Pentesting Tools Use Cases Part 2.mp4 133.9 MB 12 Pentesting Tools Scanners.mp4 101.7 MB 13 Pentesting Tools Credential Testing.mp4 97.3 MB 14 Pentesting Tools Credential Testing Part 2.mp4 93.8 MB 15 Pentesting Tools Web Directory Enum.mp4 87.2 MB 16 Pentesting Tools Debuggers.mp4 144.1 MB 17 Pentesting Tools OSINT.mp4 96.3 MB 18 Pentesting Tools Wireless.mp4 81.6 MB 19 Pentesting Tools Web Proxies.mp4 110.4 MB 20 Pentesting Tools Social Engineering.mp4 107.2 MB 21 Pentesting Tools Remote Access.mp4 119.3 MB 22 Pentesting Tools Networking.mp4 113.5 MB 23 Pentesting Tools Misc.mp4 109.8 MB 24 Pentesting Tools Mobile.mp4 83.3 MB 25 Nmap.mp4 134.9 MB 26 Common Pentest Objectives.mp4 138.7 MB 27 Analyze Scripts Bash.mp4 129 MB 28 Analyze Scripts Bash Part 2.mp4 118.1 MB 29 Analyze Scripts Bash Part 3.mp4 111.7 MB 30 Analyze Scripts Python.mp4 91.8 MB 31 Analyze Scripts Python Part 2.mp4 80 MB 32 Analyze Scripts Python Part 3.mp4 98.4 MB 33 Analyze Scripts Ruby.mp4 85.3 MB 34 Analyze Scripts Ruby Part 2.mp4 111.3 MB 35 Analyze Scripts PowerShell.mp4 67.6 MB 36 Analyze Scripts Powershell Part 2.mp4 87.2 MB 37 Info Gathering Techniques.mp4 106 MB 38 Info Gathering Techniques Part 2.mp4 105.8 MB 39 Info Gathering Techniques Part 3.mp4 138.1 MB 40 Info Gathering Techniques Part 4.mp4 83.5 MB 41 Perform Vulnerability Scans.mp4 134.6 MB 42 Perform Vulnerability Scans Part 2.mp4 137.7 MB 43 Perform Vulnerability Scans Part 3.mp4 131.7 MB 44 Perform Vulnerability Scans Part 4.mp4 91.1 MB 45 Vulnerability Scan Results.mp4 163.7 MB 46 Exploration Preparation.mp4 139.4 MB 47 Exploration Preparation Part 2.mp4 150.5 MB 48 Weaknesses in Specialized Systems.mp4 170.4 MB 49 Weaknesses in Specialized Systems Part 2.mp4 139.8 MB 50 Social Engineering.mp4 131.9 MB 51 Social Engineering Part 2.mp4 135.7 MB 52 Network Vulnerability Name Resolution.mp4 143.6 MB 53 Network Vulnerability SNMP, SMTP and FTP.mp4 99.1 MB 54 Network Vulnerability Pass-the-Hash.mp4 80.1 MB 55 Network Vulnerabilities MITM.mp4 189.1 MB 56 Network Vulnerability Denial of Service.mp4 194 MB 57 Network Vulnerabilities NAC Bypass, VLAN Hopping.mp4 115.4 MB 58 App Vulnerabilities Injection Attacks.mp4 70.2 MB 59 App Vulnerabilities Injection Attacks Part 2.mp4 101.5 MB 60 App Vulnerabilities Injection Attacks Part 3.mp4 158 MB 61 App Vulnerabilities File Inclusions.mp4 105.3 MB 62 App Vulnerabilities File Inclusions Part 2.mp4 177.2 MB 63 App Vulnerabilities XSS, CSRF, Clickjacking.mp4 116.6 MB 64 App Vulnerabilities XSS, CSRF, Clickjacking Pt2.mp4 125.8 MB 65 App Vulnerabilities Authentication, Authorization.mp4 179.3 MB 66 App Vulnerabilities Insecure Coding.mp4 174.2 MB 67 Wireless and RF Vulnerabilities.mp4 179.4 MB 68 Wireless and RF Vulnerabilities Part 2.mp4 207.6 MB 69 Host-Based Vulnerabilities.mp4 228.8 MB 70 Host Based Vulnerabilities Part 2.mp4 159.2 MB 71 Host Based Vulnerabilites Part 3.mp4 237.2 MB 72 Host-Based Vulnerabilities Part 4.mp4 112.1 MB 73 Host-Based Vulnerabilities Part 5.mp4 161.8 MB 74 Site Security.mp4 154.3 MB 75 Site Security Part 2.mp4 178.2 MB 76 Post-Exploitation.mp4 155.1 MB 77 Post-Exploitation Part 2.mp4 326.6 MB 78 Reports.mp4 183.6 MB 79 Post Report Activities.mp4 187.9 MB 80 Vulnerability Mitigation Strategies.mp4 197 MB checksums.md5 5.7 KB