Udemy - The Ultimate Guide For Network Penetration Testing
~Get Your Files Here !/1. Introduction to Network Penetration Testing/1. Introduction.mp4 22.7 MB ~Get Your Files Here !/1. Introduction to Network Penetration Testing/2. Types Of Network Security.mp4 27.7 MB ~Get Your Files Here !/2. The Lab Setup/1. Setting Up Virtualbox and Network Interface.mp4 69.3 MB ~Get Your Files Here !/2. The Lab Setup/2. Setting up kali linux [ Download ].mp4 59.2 MB ~Get Your Files Here !/2. The Lab Setup/3. Setting up kali linux [ Install ].mp4 25.8 MB ~Get Your Files Here !/2. The Lab Setup/4. Downlaod and Install Metasploitable 2.mp4 43.9 MB ~Get Your Files Here !/2. The Lab Setup/5. Downlaod and Install Metasploitable 3.mp4 132 MB ~Get Your Files Here !/2. The Lab Setup/6. Prepare A Vulnerable Web Application.mp4 34.4 MB ~Get Your Files Here !/2. The Lab Setup/7. Configuring A Vulnerable Wireless.mp4 7.6 MB ~Get Your Files Here !/2. The Lab Setup/8. QUIZ.html 161 B ~Get Your Files Here !/3. Network Scanning and Enumeration Techniques/1. Let's Start by Ennumeration.mp4 55.7 MB ~Get Your Files Here !/3. Network Scanning and Enumeration Techniques/2. Discovering The NMAP TOOL.mp4 86.4 MB ~Get Your Files Here !/3. Network Scanning and Enumeration Techniques/3. NESSUS - Setting up & Demonstration.mp4 106.5 MB ~Get Your Files Here !/3. Network Scanning and Enumeration Techniques/4. QUIZ.html 161 B ~Get Your Files Here !/4. Popular EXPLOITS/1. Let's Evade Security.mp4 123.7 MB ~Get Your Files Here !/4. Popular EXPLOITS/2. Let's Exploit Systems.mp4 46.1 MB ~Get Your Files Here !/4. Popular EXPLOITS/3. Let's Exploit Systems Part II.mp4 82.1 MB ~Get Your Files Here !/4. Popular EXPLOITS/4. QUIZ.html 161 B ~Get Your Files Here !/5. Understanding Web Application Attacks/1. The Combination of FOXYPROXY + BurpSUITE.mp4 87 MB ~Get Your Files Here !/5. Understanding Web Application Attacks/2. The SQL INJECTIONS Methods.mp4 52.2 MB ~Get Your Files Here !/5. Understanding Web Application Attacks/3. QUIZ.html 161 B ~Get Your Files Here !/6. Understanding Wireless Attacks/1. WEP EXPLAINED.mp4 12.4 MB ~Get Your Files Here !/6. Understanding Wireless Attacks/2. WEP PENETRATION METHODS.mp4 7.9 MB ~Get Your Files Here !/6. Understanding Wireless Attacks/3. WAP WAP2 EXPLAINED.mp4 13.6 MB ~Get Your Files Here !/6. Understanding Wireless Attacks/4. WAP WAP2 PENETRATION TECHNIQUES.mp4 14 MB ~Get Your Files Here !/7. Conclusion and Best Practices/1. What to do next .mp4 45 MB ~Get Your Files Here !/Bonus Resources.txt 386 B