Udemy Learn Ethical Hacking and Penetration Testing

mp4   Hot:9   Size:2.82 GB   Created:2024-10-27 02:26:08   Update:2025-05-21 12:59:37  

File List

  • Chapter 2-Getting Started with real Metasploit/2. Using and Understanding Important Console Commands in Metasploit.mp4 120.82 MB
    Chapter 1-Understanding Metasploit Modules/1. The mysterious working principle of Metasploit Framework.srt 20.61 KB
    Chapter 1-Understanding Metasploit Modules/1. The mysterious working principle of Metasploit Framework.mp4 87.05 MB
    Chapter 2-Getting Started with real Metasploit/2. Using and Understanding Important Console Commands in Metasploit.srt 32.92 KB
    Chapter 2-Getting Started with real Metasploit/3. Variables in Metasploit Framework.mp4 38.43 MB
    Chapter 2-Getting Started with real Metasploit/3. Variables in Metasploit Framework.srt 14.08 KB
    Chapter 3-Understanding Internet Networks/4. The main goal and importance of Network Security.mp4 16.84 MB
    Chapter 3-Understanding Internet Networks/4. The main goal and importance of Network Security.srt 3.43 KB
    Chapter 3-Understanding Internet Networks/5. 3 Main Ways to Make your Network Stronger.mp4 32.42 MB
    Chapter 3-Understanding Internet Networks/5. 3 Main Ways to Make your Network Stronger.srt 6.29 KB
    Chapter 3-Understanding Internet Networks/6. A Chain is no stronger than its weakest link.mp4 19.49 MB
    Chapter 3-Understanding Internet Networks/6. A Chain is no stronger than its weakest link.srt 3.76 KB
    Chapter 3-Understanding Internet Networks/7. What is Network Maps in Cyber Security.mp4 29.86 MB
    Chapter 3-Understanding Internet Networks/7. What is Network Maps in Cyber Security.srt 5.32 KB
    Chapter 3-Understanding Internet Networks/8. What is network protocol and what it does.mp4 17.44 MB
    Chapter 3-Understanding Internet Networks/8. What is network protocol and what it does.srt 5.56 KB
    Chapter 3-Understanding Internet Networks/9. Layers of TCPIP Model.mp4 17.36 MB
    Chapter 3-Understanding Internet Networks/9. Layers of TCPIP Model.srt 5.44 KB
    Chapter 3-Understanding Internet Networks/10. How emails sent and received over internet.mp4 8.57 MB
    Chapter 3-Understanding Internet Networks/10. How emails sent and received over internet.srt 3.24 KB
    Chapter 3-Understanding Internet Networks/11. PDU Explained.mp4 32.87 MB
    Chapter 3-Understanding Internet Networks/11. PDU Explained.srt 6.58 KB
    Chapter 3-Understanding Internet Networks/12. Basic Use of Switch and Data Transmission.mp4 22.83 MB
    Chapter 3-Understanding Internet Networks/12. Basic Use of Switch and Data Transmission.srt 6.12 KB
    Chapter 3-Understanding Internet Networks/13. 2 Networks Talking with Router in Middle.mp4 16.49 MB
    Chapter 3-Understanding Internet Networks/13. 2 Networks Talking with Router in Middle.srt 5.51 KB
    Chapter 3-Understanding Internet Networks/14. Main Guidelines for Network Security.mp4 43.1 MB
    Chapter 3-Understanding Internet Networks/14. Main Guidelines for Network Security.srt 8.28 KB
    Chapter 3-Understanding Internet Networks/15. Analysis to Consider and Action Priority.mp4 37.97 MB
    Chapter 3-Understanding Internet Networks/15. Analysis to Consider and Action Priority.srt 7.23 KB
    Chapter 3-Understanding Internet Networks/16. Threat Modeling.mp4 64.65 MB
    Chapter 3-Understanding Internet Networks/16. Threat Modeling.srt 12.3 KB
    Chapter 4-Understanding Linux Commands and Terminal/17. Understanding Linux Commands and Pipes.mp4 30.06 MB
    Chapter 4-Understanding Linux Commands and Terminal/17. Understanding Linux Commands and Pipes.srt 9.71 KB
    Chapter 4-Understanding Linux Commands and Terminal/18. What is a Command.mp4 11.95 MB
    Chapter 4-Understanding Linux Commands and Terminal/18. What is a Command.srt 4.08 KB
    Chapter 4-Understanding Linux Commands and Terminal/19. Pipeline example #1.mp4 34.92 MB
    Chapter 4-Understanding Linux Commands and Terminal/19. Pipeline example #1.srt 13.14 KB
    Chapter 4-Understanding Linux Commands and Terminal/20. Weird LS Command.mp4 17.7 MB
    Chapter 4-Understanding Linux Commands and Terminal/20. Weird LS Command.srt 4.46 KB
    Chapter 4-Understanding Linux Commands and Terminal/21. Different Linux Commands using with Pipe.mp4 40.13 MB
    Chapter 4-Understanding Linux Commands and Terminal/21. Different Linux Commands using with Pipe.srt 14.41 KB
    Chapter 4-Understanding Linux Commands and Terminal/22. Understanding key concepts.mp4 39.36 MB
    Chapter 4-Understanding Linux Commands and Terminal/22. Understanding key concepts.srt 9.23 KB
    Chapter 4-Understanding Linux Commands and Terminal/23. Finding Helpful manuals.mp4 41.18 MB
    Chapter 4-Understanding Linux Commands and Terminal/23. Finding Helpful manuals.srt 8.67 KB
    Chapter 4-Understanding Linux Commands and Terminal/24. Linux Directories.mp4 20.69 MB
    Chapter 4-Understanding Linux Commands and Terminal/24. Linux Directories.srt 6.86 KB
    Chapter 4-Understanding Linux Commands and Terminal/25. Linux Directories - Part 2.mp4 22.85 MB
    Chapter 4-Understanding Linux Commands and Terminal/25. Linux Directories - Part 2.srt 7.06 KB
    Chapter 5-Exploring Linux Shell and System Components/26. The bridge between You and Shell.mp4 36.56 MB
    Chapter 5-Exploring Linux Shell and System Components/26. The bridge between You and Shell.srt 10.49 KB
    Chapter 5-Exploring Linux Shell and System Components/27. LS Command.mp4 10.33 MB
    Chapter 5-Exploring Linux Shell and System Components/27. LS Command.srt 45 B
    Chapter 5-Exploring Linux Shell and System Components/28. RD vs APD.mp4 29.94 MB
    Chapter 5-Exploring Linux Shell and System Components/28. RD vs APD.srt 13.48 KB
    Chapter 5-Exploring Linux Shell and System Components/29. Filtering LS.mp4 35.11 MB
    Chapter 5-Exploring Linux Shell and System Components/29. Filtering LS.srt 9.83 KB
    Chapter 5-Exploring Linux Shell and System Components/30. CP Command.mp4 27.25 MB
    Chapter 5-Exploring Linux Shell and System Components/30. CP Command.srt 9.11 KB
    Chapter 5-Exploring Linux Shell and System Components/31. Tab Auto-completion.mp4 13.98 MB
    Chapter 5-Exploring Linux Shell and System Components/31. Tab Auto-completion.srt 4.2 KB
    Chapter 5-Exploring Linux Shell and System Components/32. SYM AND HRD Link Files.mp4 47.68 MB
    Chapter 5-Exploring Linux Shell and System Components/32. SYM AND HRD Link Files.srt 16.72 KB
    Chapter 5-Exploring Linux Shell and System Components/33. Manipulating Files.mp4 22.35 MB
    Chapter 5-Exploring Linux Shell and System Components/33. Manipulating Files.srt 8.42 KB
    Chapter 5-Exploring Linux Shell and System Components/34. Introduction to Shell and Expansion.mp4 22.99 MB
    Chapter 5-Exploring Linux Shell and System Components/34. Introduction to Shell and Expansion.srt 8.72 KB
    Chapter 5-Exploring Linux Shell and System Components/35. Arithmetic Expressions with Shell.mp4 15.92 MB
    Chapter 5-Exploring Linux Shell and System Components/35. Arithmetic Expressions with Shell.srt 4.79 KB
    Chapter 5-Exploring Linux Shell and System Components/36. Automating Folder Creation with Shell.mp4 34.95 MB
    Chapter 5-Exploring Linux Shell and System Components/36. Automating Folder Creation with Shell.srt 10.14 KB
    Chapter 5-Exploring Linux Shell and System Components/37. Quoting in Shell.mp4 38.83 MB
    Chapter 5-Exploring Linux Shell and System Components/37. Quoting in Shell.srt 12.85 KB
    Chapter 6-Permissions and Processes in Linux/38. Introduction to Permissions in Linux.mp4 15.33 MB
    Chapter 6-Permissions and Processes in Linux/38. Introduction to Permissions in Linux.srt 6.07 KB
    Chapter 6-Permissions and Processes in Linux/39. Differences between UID, GID and Shadow.mp4 24.13 MB
    Chapter 6-Permissions and Processes in Linux/39. Differences between UID, GID and Shadow.srt 7.13 KB
    Chapter 6-Permissions and Processes in Linux/40. File and Dir Permissions.mp4 48.68 MB
    Chapter 6-Permissions and Processes in Linux/40. File and Dir Permissions.srt 10.08 KB
    Chapter 6-Permissions and Processes in Linux/41. Examples with File Permissions.mp4 15.73 MB
    Chapter 6-Permissions and Processes in Linux/41. Examples with File Permissions.srt 5.76 KB
    Chapter 6-Permissions and Processes in Linux/42. After this video you--'ll understand all LINUX Permissions.mp4 82.36 MB
    Chapter 6-Permissions and Processes in Linux/42. After this video you--'ll understand all LINUX Permissions.srt 25.66 KB
    Chapter 6-Permissions and Processes in Linux/43. Chmod.mp4 56.64 MB
    Chapter 6-Permissions and Processes in Linux/43. Chmod.srt 14.93 KB
    Chapter 6-Permissions and Processes in Linux/Extra_Files/A4.txt 669 B
    Chapter 7-Process Management in Linux/44. Fundamentals of Processes in System.mp4 35.8 MB
    Chapter 7-Process Management in Linux/44. Fundamentals of Processes in System.srt 8.85 KB
    Chapter 7-Process Management in Linux/45. The Magic with PS Aux Command.mp4 52.51 MB
    Chapter 7-Process Management in Linux/45. The Magic with PS Aux Command.srt 10.23 KB
    Chapter 7-Process Management in Linux/46. The Magic with TOP Command.mp4 54.72 MB
    Chapter 7-Process Management in Linux/46. The Magic with TOP Command.srt 10.75 KB
    Chapter 7-Process Management in Linux/47. Foreground and Background Processes.mp4 27.77 MB
    Chapter 7-Process Management in Linux/47. Foreground and Background Processes.srt 10.73 KB
    Chapter 7-Process Management in Linux/48. From Background to Foreground.mp4 13.79 MB
    Chapter 7-Process Management in Linux/48. From Background to Foreground.srt 6.01 KB
    Chapter 7-Process Management in Linux/49. The Tutorial with Linux Process Signals.mp4 48.84 MB
    Chapter 7-Process Management in Linux/49. The Tutorial with Linux Process Signals.srt 16.3 KB
    Chapter 7-Process Management in Linux/50. Introduction to Packet Management Systems.mp4 22.4 MB
    Chapter 7-Process Management in Linux/50. Introduction to Packet Management Systems.srt 6.43 KB
    Chapter 7-Process Management in Linux/51. Why we need package management tools.mp4 19.37 MB
    Chapter 7-Process Management in Linux/51. Why we need package management tools.srt 8.75 KB
    Chapter 7-Process Management in Linux/52. Package Management in Linux - Final.mp4 47.8 MB
    Chapter 7-Process Management in Linux/52. Package Management in Linux - Final.srt 10.79 KB
    Chapter 8-Networking in Linux/53. Trcrt command.mp4 38.2 MB
    Chapter 8-Networking in Linux/53. Trcrt command.srt 11.11 KB
    Chapter 8-Networking in Linux/54. Networking with Linux.mp4 30.66 MB
    Chapter 8-Networking in Linux/54. Networking with Linux.srt 9.8 KB
    Chapter 9-Starting with Network Security and Networks Penetration Tests/55. What is Wireshark and What you--'ll learn in this section.mp4 11.43 MB
    Chapter 9-Starting with Network Security and Networks Penetration Tests/55. What is Wireshark and What you--'ll learn in this section.srt 2.31 KB
    Chapter 9-Starting with Network Security and Networks Penetration Tests/56. Introduction to Interface and Important Shortcuts.mp4 72.36 MB
    Chapter 9-Starting with Network Security and Networks Penetration Tests/56. Introduction to Interface and Important Shortcuts.srt 13.75 KB
    Chapter 9-Starting with Network Security and Networks Penetration Tests/57. The Importance of Promiscous Mode.mp4 23.31 MB
    Chapter 9-Starting with Network Security and Networks Penetration Tests/57. The Importance of Promiscous Mode.srt 6.11 KB
    Chapter 9-Starting with Network Security and Networks Penetration Tests/58. Displaying the Captured Data and Plugins.mp4 62.6 MB
    Chapter 9-Starting with Network Security and Networks Penetration Tests/58. Displaying the Captured Data and Plugins.srt 10.92 KB
    Chapter 9-Starting with Network Security and Networks Penetration Tests/59. Learning Key Concepts and Tools.mp4 44.54 MB
    Chapter 9-Starting with Network Security and Networks Penetration Tests/59. Learning Key Concepts and Tools.srt 18.45 KB
    Chapter 9-Starting with Network Security and Networks Penetration Tests/60. IDS, ACL and Firewalls.mp4 17.2 MB
    Chapter 9-Starting with Network Security and Networks Penetration Tests/60. IDS, ACL and Firewalls.srt 4.47 KB
    Chapter 9-Starting with Network Security and Networks Penetration Tests/61. Starting to Capture Traffic with Wireshark and Live Filters.mp4 90.09 MB
    Chapter 9-Starting with Network Security and Networks Penetration Tests/61. Starting to Capture Traffic with Wireshark and Live Filters.srt 16.88 KB
    Chapter 9-Starting with Network Security and Networks Penetration Tests/62. Understanding Signal Types.mp4 29.36 MB
    Chapter 9-Starting with Network Security and Networks Penetration Tests/62. Understanding Signal Types.srt 7.45 KB
    Chapter 9-Starting with Network Security and Networks Penetration Tests/63. Beginning to use Wireshark Display Filters.mp4 74.72 MB
    Chapter 9-Starting with Network Security and Networks Penetration Tests/63. Beginning to use Wireshark Display Filters.srt 13.33 KB
    Chapter 9-Starting with Network Security and Networks Penetration Tests/64. Learning TCP States.mp4 11.18 MB
    Chapter 9-Starting with Network Security and Networks Penetration Tests/64. Learning TCP States.srt 5.4 KB
    Chapter 10-Vulnerability Assessment and Information Gathering with Metasploit/65. Information Gathering on TCP and UDP Protocols using Metasploit.mp4 74.54 MB
    Chapter 10-Vulnerability Assessment and Information Gathering with Metasploit/65. Information Gathering on TCP and UDP Protocols using Metasploit.srt 17.48 KB
    Chapter 10-Vulnerability Assessment and Information Gathering with Metasploit/66. Two Methods to Hack Into FTP Servers.mp4 89.37 MB
    Chapter 10-Vulnerability Assessment and Information Gathering with Metasploit/66. Two Methods to Hack Into FTP Servers.srt 15.66 KB
    Chapter 10-Vulnerability Assessment and Information Gathering with Metasploit/67. Information Gathering and Finding Exploits of SMB.mp4 42.26 MB
    Chapter 10-Vulnerability Assessment and Information Gathering with Metasploit/67. Information Gathering and Finding Exploits of SMB.srt 9.41 KB
    Chapter 10-Vulnerability Assessment and Information Gathering with Metasploit/68. Finding Vulnerabilities in PHP and Apache.mp4 62.38 MB
    Chapter 10-Vulnerability Assessment and Information Gathering with Metasploit/68. Finding Vulnerabilities in PHP and Apache.srt 14.19 KB
    Chapter 10-Vulnerability Assessment and Information Gathering with Metasploit/69. SSH User Enumeration.mp4 56.94 MB
    Chapter 10-Vulnerability Assessment and Information Gathering with Metasploit/69. SSH User Enumeration.srt 10.04 KB
    Chapter 10-Vulnerability Assessment and Information Gathering with Metasploit/70. Brute Forcing SSH and Information Gathering.mp4 64.66 MB
    Chapter 10-Vulnerability Assessment and Information Gathering with Metasploit/70. Brute Forcing SSH and Information Gathering.srt 10.61 KB
    Chapter 11-Penetration testing on Industrial Control System (ICS Pentest)/71. Creating Pentest Lab for Industrial Control Systems.mp4 115.97 MB
    Chapter 11-Penetration testing on Industrial Control System (ICS Pentest)/71. Creating Pentest Lab for Industrial Control Systems.srt 26.95 KB
    Chapter 11-Penetration testing on Industrial Control System (ICS Pentest)/72. Pentesting Industrial Control Systems.mp4 110.44 MB
    Chapter 11-Penetration testing on Industrial Control System (ICS Pentest)/72. Pentesting Industrial Control Systems.srt 19.57 KB

Download Info

  • Tips

    “Udemy Learn Ethical Hacking and Penetration Testing” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.