CompTIA PenTest + (PT0-002)
File List
- 3 - Attacks and Exploits/22 - Social Engineering and Physical Attacks.mp4 475.1 MB
- 4 - Reporting and Communication/3 - Communication During a Pentest.mp4 455.9 MB
- 3 - Attacks and Exploits/14 - Cloud Attacks.mp4 434.1 MB
- 4 - Reporting and Communication/2 - Recommended Remediations.mp4 422.0 MB
- 3 - Attacks and Exploits/15 - Mobile Attacks.mp4 419.4 MB
- 3 - Attacks and Exploits/19 - ICS SCADA and IIOT Vulnerabilities.mp4 410.5 MB
- 4 - Reporting and Communication/1 - Components of Written Reports.mp4 405.9 MB
- 1 - Planning and Scoping/4 - Legal Concepts and Documents.mp4 405.7 MB
- 1 - Planning and Scoping/7 - Professionalism and Integrity.mp4 397.2 MB
- 2 - Information Gathering and Vulnerability Scanning/6 - Vulnerability Scanning.mp4 385.1 MB
- 3 - Attacks and Exploits/2 - Denial of Service.mp4 376.1 MB
- 3 - Attacks and Exploits/7 - OWASP Top 10 Web App Security Risks.mp4 372.4 MB
- 3 - Attacks and Exploits/1 - Exploit Resources.mp4 369.5 MB
- 5 - Tools and Code Analysis/1 - Basic Programming Concepts.mp4 369.3 MB
- 3 - Attacks and Exploits/11 - Wireless Attacks.mp4 362.9 MB
- 3 - Attacks and Exploits/17 - IoT Hacking.mp4 357.9 MB
- 2 - Information Gathering and Vulnerability Scanning/4 - Web and Cloud Discovery and Enumeration.mp4 347.8 MB
- 3 - Attacks and Exploits/25 - Privilege Escalation.mp4 338.1 MB
- 2 - Information Gathering and Vulnerability Scanning/7 - Nmap.mp4 337.9 MB
- 3 - Attacks and Exploits/12 - Session Attacks.mp4 328.7 MB
- 4 - Reporting and Communication/4 - Post Report Delivery Activities.mp4 327.7 MB
- 3 - Attacks and Exploits/4 - Password Attacks.mp4 325.5 MB
- 5 - Tools and Code Analysis/2 - Analyze Scripts Or Code For Use In A Pentest.mp4 325.2 MB
- 1 - Planning and Scoping/5 -Standards and Methodologies.mp4 322.9 MB
- 2 - Information Gathering and Vulnerability Scanning/5 - Defense Detection and Avoidance.mp4 321.8 MB
- 2 - Information Gathering and Vulnerability Scanning/2 - Target Recon.mp4 321.0 MB
- 3 - Attacks and Exploits/9 - SQL Injection Attacks.mp4 320.1 MB
- 3 - Attacks and Exploits/27 - Detection Avoidance.mp4 314.1 MB
- 3 - Attacks and Exploits/3 - ARP and DNS Poisoning.mp4 310.5 MB
- 1 - Planning and Scoping/2 - Regulation and Compliance.mp4 302.9 MB
- 3 - Attacks and Exploits/13 - API Attacks.mp4 291.8 MB
- 3 - Attacks and Exploits/10 - Other Injection Attacks.mp4 290.4 MB
- 3 - Attacks and Exploits/26 - Persistence.mp4 289.0 MB
- 1 - Planning and Scoping/6 - Scoping an Engagement.mp4 285.3 MB
- 2 - Information Gathering and Vulnerability Scanning/3 - Host Discovery and Enumeration.mp4 269.7 MB
- 3 - Attacks and Exploits/23 - Post Exploitation Enumeration and Tools.mp4 264.3 MB
- 1 - Planning and Scoping/3 - Common Pentest Restrictions.mp4 259.8 MB
- 3 - Attacks and Exploits/18 - Data Storage System Vulnerabilities.mp4 259.3 MB
- 3 - Attacks and Exploits/5 - MAC Spoofing.mp4 225.8 MB
- 3 - Attacks and Exploits/21 - Container Vulnerabilities.mp4 214.4 MB
- 2 - Information Gathering and Vulnerability Scanning/1 - DNS Recon.mp4 211.3 MB
- 3 - Attacks and Exploits/8 - SSRF Attacks.mp4 210.1 MB
- 3 - Attacks and Exploits/20 - Virtual Environment Vulnerabilities.mp4 201.8 MB
- 3 - Attacks and Exploits/16 - XSS Attacks.mp4 195.3 MB
- 5 - Tools and Code Analysis/3 - Opportunities for Automation.mp4 190.8 MB
- 3 - Attacks and Exploits/24 - Network Segmentation Testing.mp4 183.8 MB
- 3 - Attacks and Exploits/8 - Business Logic Flaws.mp4 178.5 MB
- 3 - Attacks and Exploits/6 - VLAN Hopping.mp4 173.3 MB
- 1 - Planning and Scoping/1 - Overview.mp4 141.4 MB
- 1 - Planning and Scoping/comptia-pentestplus-pt0002.zip 4.5 MB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.