Download link
File List
-
0_Introduction/01_Welcome.mp4 13.34 MB
0_Introduction/02_What_you_should_know.mp4 1.06 MB
0_Introduction/03_Hacking_ethically.mp4 2.47 MB
1_1._Organizational_Penetration_Testing/04_Auditing_security_mechanisms.mp4 7.74 MB
1_1._Organizational_Penetration_Testing/05_Locating_security_vulnerabilities.mp4 5.62 MB
1_1._Organizational_Penetration_Testing/06_Understanding_penetration_testing.mp4 5.82 MB
1_1._Organizational_Penetration_Testing/07_Identifying_the_attack_vectors.mp4 4.89 MB
2_2._Types_of_Penetration_Testing/08_Black_gray_and_white-box_testing.mp4 6.67 MB
2_2._Types_of_Penetration_Testing/09_Checking_from_the_outside_in.mp4 5.34 MB
2_2._Types_of_Penetration_Testing/10_Looking_inside_the_organization.mp4 6.66 MB
2_2._Types_of_Penetration_Testing/11_Testing_using_other_methods.mp4 4.58 MB
3_3._Pen_Testing_Techniques/12_Following_a_structured_plan.mp4 5.59 MB
3_3._Pen_Testing_Techniques/13_Planning_the_pen_test.mp4 16.08 MB
3_3._Pen_Testing_Techniques/14_Attacking_the_system.mp4 5.18 MB
3_3._Pen_Testing_Techniques/15_Delivering_the_results.mp4 14.25 MB
4_4._Pen_Testing_Blueprint/16_Checking_physical_security.mp4 5.62 MB
4_4._Pen_Testing_Blueprint/17_Wireless_penetration_testing.mp4 8.86 MB
4_4._Pen_Testing_Blueprint/18_Breach_the_website_and_the_database.mp4 10.04 MB
4_4._Pen_Testing_Blueprint/19_Leaking_data_via_email_or_VoIP.mp4 8.14 MB
4_4._Pen_Testing_Blueprint/20_Social_engineering.mp4 6.36 MB
5_5._Outsourcing_Penetration_Testing/21_Defining_the_project_scope.mp4 6.08 MB
5_5._Outsourcing_Penetration_Testing/22_Outsourcing_penetration_testing.mp4 4.78 MB
5_5._Outsourcing_Penetration_Testing/23_Hiring_consultants.mp4 7.39 MB
5_5._Outsourcing_Penetration_Testing/24_Agreeing_on_terms.mp4 11.51 MB
6_Conclusion/25_Next_steps.mp4 3.02 MB
Download Info
-
Tips
“Ethical_Hacking_-_Penetration_Testing” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.