FileMood

Download CBR41907

CBR41907

Name

CBR41907

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

2.9 GB

Total Files

88

Hash

BE65EDF1E5AFBE4EF81C4EE30685F8C7131CF951

/

0 Pre-Engagement Interactions -- 0 What is the Penetration Testing Execution Standard (PTES)?.mp4

114.2 MB

0 Pre-Engagement Interactions -- 1 Who and Why?.mp4

51.6 MB

0 Pre-Engagement Interactions -- 10 Scoping Meeting Part 2.mp4

45.2 MB

0 Pre-Engagement Interactions -- 11 Additional Support Part 1.mp4

43.4 MB

0 Pre-Engagement Interactions -- 12 Additional Support Part 2.mp4

47.6 MB

0 Pre-Engagement Interactions -- 13 PTES Questionnaires Part 1.mp4

35.9 MB

0 Pre-Engagement Interactions -- 14 PTES Questionnaires Part 2.mp4

46.7 MB

0 Pre-Engagement Interactions -- 15 Scope Creep.mp4

48.4 MB

0 Pre-Engagement Interactions -- 16 Start and End Dates.mp4

54.9 MB

0 Pre-Engagement Interactions -- 17 Specify IP Ranges and Domains.mp4

67.5 MB

0 Pre-Engagement Interactions -- 18 Dealing With Third Parties.mp4

73.3 MB

0 Pre-Engagement Interactions -- 19 Define Acceptable Sociable Engineering Pretexts Part 1.mp4

48.5 MB

0 Pre-Engagement Interactions -- 2 Course Use.mp4

73.8 MB

0 Pre-Engagement Interactions -- 20 Define Acceptable Sociable Engineering Pretexts Part 2.mp4

33.7 MB

0 Pre-Engagement Interactions -- 21 DoS Testing.mp4

39.4 MB

0 Pre-Engagement Interactions -- 22 Payment Terms Part 1.mp4

60.5 MB

0 Pre-Engagement Interactions -- 23 Payment Terms Part 2.mp4

23.7 MB

0 Pre-Engagement Interactions -- 24 Goals.mp4

38.3 MB

0 Pre-Engagement Interactions -- 25 Establish Lines of Communication Part 1.mp4

39.0 MB

0 Pre-Engagement Interactions -- 26 Establishing Lines of Communication Part 2.mp4

40.5 MB

0 Pre-Engagement Interactions -- 27 Rules of Engagement Part 1.mp4

65.0 MB

0 Pre-Engagement Interactions -- 28 Rules of Engagement Part 2.mp4

28.2 MB

0 Pre-Engagement Interactions -- 29 Capabilities and Technology in Place.mp4

54.4 MB

0 Pre-Engagement Interactions -- 3 Pre-Engagement Interactions Overview Part 1.mp4

27.9 MB

0 Pre-Engagement Interactions -- 30 Module 1 Summary.mp4

23.9 MB

0 Pre-Engagement Interactions -- 4 Pre-Engagement Interactions Overview Part 2.mp4

47.1 MB

0 Pre-Engagement Interactions -- 5 Introduction to Scope Part 1.mp4

46.0 MB

0 Pre-Engagement Interactions -- 6 Introduction to Scope Part 2.mp4

30.7 MB

0 Pre-Engagement Interactions -- 7 Metrics for Time Estimation Part 1.mp4

47.6 MB

0 Pre-Engagement Interactions -- 8 Metrics for Time Estimation Part 2.mp4

32.7 MB

0 Pre-Engagement Interactions -- 9 Scoping Meeting Part 1.mp4

36.0 MB

1 Intelligence Gathering -- 0 Intelligence Gathering Overview.mp4

9.5 MB

1 Intelligence Gathering -- 1 General Background Concepts.mp4

77.6 MB

1 Intelligence Gathering -- 10 Footprinting: Internal.mp4

30.9 MB

1 Intelligence Gathering -- 11 Identity Protection Mechanisms.mp4

23.6 MB

1 Intelligence Gathering -- 12 Module 2 Summary.mp4

12.9 MB

1 Intelligence Gathering -- 2 Business Asset Analyst.mp4

40.1 MB

1 Intelligence Gathering -- 3 Intelligence Gathering Basics.mp4

26.2 MB

1 Intelligence Gathering -- 4 Target Selection.mp4

48.9 MB

1 Intelligence Gathering -- 5 OSINT Part 1.mp4

53.3 MB

1 Intelligence Gathering -- 6 OSINT Part 2.mp4

38.6 MB

1 Intelligence Gathering -- 7 OSINT Part 3.mp4

31.4 MB

1 Intelligence Gathering -- 8 Covert Gathering.mp4

26.8 MB

1 Intelligence Gathering -- 9 Footprinting: External.mp4

38.0 MB

2 Threat Modeling -- 0 Threat Modeling Overview.mp4

7.8 MB

2 Threat Modeling -- 1 General: Modeling Process.mp4

34.5 MB

2 Threat Modeling -- 2 Business Asset Analysis.mp4

40.0 MB

2 Threat Modeling -- 3 Business Process Analysis.mp4

32.3 MB

2 Threat Modeling -- 4 Threat Agent_Community Analysis.mp4

28.2 MB

2 Threat Modeling -- 5 Threat Capability Analysis.mp4

29.4 MB

2 Threat Modeling -- 6 Motivation Modeling.mp4

13.6 MB

2 Threat Modeling -- 7 Finding Relevant News.mp4

22.3 MB

2 Threat Modeling -- 8 Module 3 Summary.mp4

9.6 MB

3 Vulnerability Analysis -- 0 Vulnerability Analysis Overview.mp4

6.7 MB

3 Vulnerability Analysis -- 1 Vulnerability Testing.mp4

33.8 MB

3 Vulnerability Analysis -- 2 Active Testing.mp4

42.0 MB

3 Vulnerability Analysis -- 3 Passive Testing.mp4

20.5 MB

3 Vulnerability Analysis -- 4 Validation.mp4

41.3 MB

3 Vulnerability Analysis -- 5 Research.mp4

41.6 MB

3 Vulnerability Analysis -- 6 Module 4 Summary.mp4

7.0 MB

4 Exploitation -- 0 Exploitation Overview.mp4

7.8 MB

4 Exploitation -- 1 Purpose.mp4

31.3 MB

4 Exploitation -- 2 Countermeasures.mp4

36.7 MB

4 Exploitation -- 3 Evasion.mp4

26.7 MB

4 Exploitation -- 4 Precision Strike.mp4

17.5 MB

4 Exploitation -- 5 Customized Exploitation Avenue.mp4

31.2 MB

4 Exploitation -- 6 Zero Day Angle.mp4

30.7 MB

4 Exploitation -- 7 Example Avenues of Attack.mp4

26.6 MB

4 Exploitation -- 8 Overall Objectives.mp4

16.0 MB

4 Exploitation -- 9 Module 5 Summary.mp4

9.2 MB

5 Post-Exploitation -- 0 Post-Exploitation Overview.mp4

6.8 MB

5 Post-Exploitation -- 1 Purpose.mp4

14.3 MB

5 Post-Exploitation -- 10 Cleanup.mp4

11.7 MB

5 Post-Exploitation -- 11 Module 6 Summary.mp4

11.0 MB

5 Post-Exploitation -- 2 Rules of Engagement: Post-Exploitation.mp4

22.1 MB

5 Post-Exploitation -- 3 Infrastructure Analysis.mp4

27.6 MB

5 Post-Exploitation -- 4 Pillaging Part 1.mp4

35.9 MB

5 Post-Exploitation -- 5 Pillaging Part 2.mp4

23.1 MB

5 Post-Exploitation -- 6 High Value_Profile Targets.mp4

20.4 MB

5 Post-Exploitation -- 7 Data Infiltration.mp4

18.4 MB

5 Post-Exploitation -- 8 Persistence.mp4

17.5 MB

5 Post-Exploitation -- 9 Further Penetration Into Infrastructure.mp4

13.7 MB

6 Reporting -- 0 Reporting Overview.mp4

3.7 MB

6 Reporting -- 1 Reporting Structure.mp4

9.1 MB

6 Reporting -- 2 The Executive Summary.mp4

26.4 MB

6 Reporting -- 3 Technical Support.mp4

26.3 MB

6 Reporting -- 4 Module 7 Summary.mp4

4.3 MB

7 Summary -- 0 Course Summary.mp4

6.9 MB

 

Total files 88


Copyright © 2025 FileMood.com