Udemy - The Ultimate Guide For Network Penetration Testing

Photo unavailable
Category:
Date:
02/29/24 at 5:03pm GMT+1
Submitter:
Seeders:
15
Leechers:
2
File size:
1.1 GB in 27 files

Torrent Status:
  This torrent has been verified.

Infohash:
bc15416297de49fbd6c5efdedae370cf01708f2e


File list

  • Udemy - The Ultimate Guide For Network Penetration Testing
  • icon ~Get Your Files Here !/1. Introduction to Network Penetration Testing/1. Introduction.mp4 22.7 MB
    icon ~Get Your Files Here !/1. Introduction to Network Penetration Testing/2. Types Of Network Security.mp4 27.7 MB
    icon ~Get Your Files Here !/2. The Lab Setup/1. Setting Up Virtualbox and Network Interface.mp4 69.3 MB
    icon ~Get Your Files Here !/2. The Lab Setup/2. Setting up kali linux [ Download ].mp4 59.2 MB
    icon ~Get Your Files Here !/2. The Lab Setup/3. Setting up kali linux [ Install ].mp4 25.8 MB
    icon ~Get Your Files Here !/2. The Lab Setup/4. Downlaod and Install Metasploitable 2.mp4 43.9 MB
    icon ~Get Your Files Here !/2. The Lab Setup/5. Downlaod and Install Metasploitable 3.mp4 132 MB
    icon ~Get Your Files Here !/2. The Lab Setup/6. Prepare A Vulnerable Web Application.mp4 34.4 MB
    icon ~Get Your Files Here !/2. The Lab Setup/7. Configuring A Vulnerable Wireless.mp4 7.6 MB
    icon ~Get Your Files Here !/2. The Lab Setup/8. QUIZ.html 161 B
    icon ~Get Your Files Here !/3. Network Scanning and Enumeration Techniques/1. Let's Start by Ennumeration.mp4 55.7 MB
    icon ~Get Your Files Here !/3. Network Scanning and Enumeration Techniques/2. Discovering The NMAP TOOL.mp4 86.4 MB
    icon ~Get Your Files Here !/3. Network Scanning and Enumeration Techniques/3. NESSUS - Setting up & Demonstration.mp4 106.5 MB
    icon ~Get Your Files Here !/3. Network Scanning and Enumeration Techniques/4. QUIZ.html 161 B
    icon ~Get Your Files Here !/4. Popular EXPLOITS/1. Let's Evade Security.mp4 123.7 MB
    icon ~Get Your Files Here !/4. Popular EXPLOITS/2. Let's Exploit Systems.mp4 46.1 MB
    icon ~Get Your Files Here !/4. Popular EXPLOITS/3. Let's Exploit Systems Part II.mp4 82.1 MB
    icon ~Get Your Files Here !/4. Popular EXPLOITS/4. QUIZ.html 161 B
    icon ~Get Your Files Here !/5. Understanding Web Application Attacks/1. The Combination of FOXYPROXY + BurpSUITE.mp4 87 MB
    icon ~Get Your Files Here !/5. Understanding Web Application Attacks/2. The SQL INJECTIONS Methods.mp4 52.2 MB
    icon ~Get Your Files Here !/5. Understanding Web Application Attacks/3. QUIZ.html 161 B
    icon ~Get Your Files Here !/6. Understanding Wireless Attacks/1. WEP EXPLAINED.mp4 12.4 MB
    icon ~Get Your Files Here !/6. Understanding Wireless Attacks/2. WEP PENETRATION METHODS.mp4 7.9 MB
    icon ~Get Your Files Here !/6. Understanding Wireless Attacks/3. WAP WAP2 EXPLAINED.mp4 13.6 MB
    icon ~Get Your Files Here !/6. Understanding Wireless Attacks/4. WAP WAP2 PENETRATION TECHNIQUES.mp4 14 MB
    icon ~Get Your Files Here !/7. Conclusion and Best Practices/1. What to do next .mp4 45 MB
    icon ~Get Your Files Here !/Bonus Resources.txt 386 B

Similar Torrents