محتوى الدورة
introduction to course
0/15
introduction pen testing
31:26
VPN
17:29
Network part 1
44:00
Network part 2
28:44
Network part 3
24:11
Network part 4
37:24
Network part 5
39:02
Network part 6
37:30
Network part 7
16:04
wireshark part 1
39:42
wireshark part 2(extra)
24:53
wireshark part3 (extra)
28:46
Wep application part 1
32:24
web application part 2
25:55
web application part 3
15:30
Basic kali linux (old)
0/5
kali download
11:21
command kali part 1
19:14
command kali part 2
35:40
command kali part 3
35:14
abbreviations in Kali Linux
14:26
Assessment methodologies
0/29
information gathering part 1
21:42
information gathering part 2
32:03
information gathering part 3
30:38
information gathering part 4
16:21
information gathering part 5
34:55
information gathering part 6
44:44
information gathering part 7
53:48
footprinting & scanning part 1
28:22
footprinting & scanning part 2
47:33
footprinting & scanning part 3
35:06
footprinting & scanning part 4
36:21
footprinting & scanning part 5 (vulnversity lab 1)
15:35
footprinting & scanning part 6 (Passive Recon lab2)
19:52
footprinting & scanning part 7 (Active Recon lab3)
18:25
footprinting & scanning part 8 (lab 4 Blue SMB )
47:53
footprinting & scanning part 9 ( lab 5)
07:08
Enumeration part 1
54:54
Enumeration part 2 (FTP brute force attack)
28:31
Enumeration part3 (lab 2 login SSH)
21:22
Enumeration part 4 (lab 3 Enumeration apache)
43:36
Enumeration part 5 (lab 4 samba recon )
18:04
Enumeration part 6 (lab5 Mysql Recon)
38:00
Enumeration part 7 (lab 6 Enumeration Telnet )
23:37
Enumeration part 8 (lab 7 Enumeration SMTP)
28:20
Vulnerability assessment part 1
31:24
Vulnerability assessment part 2
17:22
Vulnerability assessment part 3 (lab 1 nessus)
34:59
Vulnerability assessment part 4 (lab 2 webdav)
29:59
Vulnerability assessment part 5 (lab3 shellshock)
35:20
Network Auditing
0/1
auditing fundamentals
26:19
Host&Network penetration testing
0/69
system and host based attack part 1
30:05
system and host based attack part 2 (webdav part 1)
29:59
system and host based attack part3(webdav part2 )
26:56
system and host based attack part4 SMB
22:01
system and host based attack part 5(lab3 psexec)
53:27
system and host based attack part6(lab 4 SMB)
39:02
system and host based attack part 7 (RDP)
11:46
system and host based attack part 8 (lab 5 RDP)
18:18
system and host based attack part 9
09:04
system and host based attack part 10 (lab 6 WinRM)
32:20
system and host based attack part 11
13:18
system and host based attack part 12 (UAC)
15:39
system and host based attack part 13(lab 7 UAC)
34:27
system and host based attack part 14
13:32
system and host based attack part 15 (lab8 Token)
13:18
system and host based attack part 16
27:53
system and host based attack part 17(lab9 Unatted)
16:21
system and host based attack part 18 (lab10 kiwi)
13:22
system and host based attack part 19
24:08
system and host based attack part 20 (lab 11shellshoke)
35:20
system and host based attack part 21
08:56
system and host based attack part 22 (lab 12 FTP)
28:31
system and host based attack part 23 (lab SSH)
21:22
system and host based attack part 24(lab 14 samba)
18:04
system and host based attack part 25
17:14
system and host based attack part 26 (lab 15 cron)
19:10
system and host based attack part 27 (lab 16 SUID)
24:52
system and host based attack part 28 (lab 17 SUID)
36:06
Network based attack part 1
24:12
Network based attack part 2 (lab 1 NetBios)
17:14
Network based attack part 3
14:52
Network based attack part 4 (lab 2 SNMP)
37:02
Network based attack part 5
12:59
Metasploit framework part 1
26:29
Metasploit framework part 2
28:25
Metasploit framework part 3
11:31
Metasploit framework part 4 (lab 1)
20:00
Metasploit framework Part 5
16:05
Metasploit framework part 6 (lab 2 FTP)
21:05
Metasploit framework Part 7 (lab 3 SMB)
28:26
Metasploit framework part 8 (lab 4 Web Server)
43:52
Metasploit framework part 9 (lab 5 MySQL)
31:19
Metasploit framework part 10 (lab 6 SSH)
20:17
Metasploit framework part 11 (lab 6 SMTP)
28:20
Metasploit framework part 12
12:42
metasploitable3 download
05:49
Metasploit framework part 12 (lab 7 wmap )
15:15
Metasploit framework Part 13
19:14
Metasploit framework Part 14 (lab 8)
16:29
Metasploit framework Part 15 (lab 9)
14:50
Metasploit framework Part 16 (lab 10)
08:20
Metasploit framework Part 17 (lab 11)
22:56
Metasploit framework Part 18 (lab 12)
45:45
Metasploit framework Part 19 (lab 13 )
18:43
Metasploit framework Part 20 (lab 14 )
15:59
Metasploit framework part 21 (lab 15)
23:31
Metasploit framework part 22 (lab 16 )
10:15
Metasploit framework Part 23 (lab 17)
18:46
Metasploit framework Part 24
11:03
Metasploit framework Part 25 (lab 18)
32:20
Metasploit framework Part 26
09:30
Metasploit framework Part 27 lab 19
26:06
Metasploit framework Part 28 (lab 20)
20:28
Metasploit framework Part 29
14:03
(Metasploit Framework Part 30 (lab 21
22:00
(Metasploit Framework Part 31 (lab 22
10:06
Metasploit Framework Part 32
09:50
Metasploit Framework Part 33 (lab23)
34:27
Metasploit Framework Part 34
18:48
eJPTv2
ملفات التمرين
1-Introduction to Pen.pptx
حجم: 667.31 كيلوبايت
0%
مكتمل
وضع علامة مكتمل
Home
Services
About
Courses
Teachers
Community
Contact
Exams
CTF
Cys Tech
الصفحة الرئيسية
لغات البرمجة
امن سيبراني
الشبكات
انظمة التشغيل
مواد جامعية
My account
الصفحة الرئيسية
لغات البرمجة
امن سيبراني
الشبكات
انظمة التشغيل
مواد جامعية
My account
تسجيل الدخول