Details for:

Type:
Files:
Size:

Uploaded On:
Added By:
Not Trusted

Seeders:
Leechers:
Info Hash:
E1241498D36E5D1FDD643DC1F2C90F3885111272
  1. 0. Websites you may like/1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url 377 bytes
  2. 0. Websites you may like/2. FTUApps.com Download Cracked Developers Applications For Free.url 239 bytes
  3. 1. Opening Lectures/1. Introduction to the Course - Do Not Skip.mp4 43.8 MB
  4. 1. Opening Lectures/1. Introduction to the Course - Do Not Skip.srt 9.7 KB
  5. 1. Opening Lectures/2. Disclaimer.html 1.6 KB
  6. 1. Opening Lectures/3. Thankyou for taking this course. What should you expect.html 2.5 KB
  7. 1. Opening Lectures/4. What can you do to get the most out of this course.mp4 36.2 MB
  8. 1. Opening Lectures/4. What can you do to get the most out of this course.srt 6.7 KB
  9. 1. Opening Lectures/5. How to get answers to your questions and help with problems.mp4 35.8 MB
  10. 1. Opening Lectures/5. How to get answers to your questions and help with problems.srt 7.1 KB
  11. 10. Happy Ending Lectures/1. How to go more advanced with this course.html 3.0 KB
  12. 10. Happy Ending Lectures/2. Unlock your certificate and upgrade your LinkedIn profile using this course!.mp4 16.4 MB
  13. 10. Happy Ending Lectures/2. Unlock your certificate and upgrade your LinkedIn profile using this course!.srt 2.9 KB
  14. 10. Happy Ending Lectures/3. What's your next step after doing this course.html 1.2 KB
  15. 10. Happy Ending Lectures/4. Thank you very much for completing this course!.mp4 5.4 MB
  16. 10. Happy Ending Lectures/4. Thank you very much for completing this course!.srt 3.1 KB
  17. 11. BONUS Section/1. Bonus Lecture.html 2.1 KB
  18. 2. Fundamentals/1. Lab Setup using the VMware Player.mp4 110.9 MB
  19. 2. Fundamentals/1. Lab Setup using the VMware Player.srt 17.6 KB
  20. 2. Fundamentals/1.1 First Target Machine Basic PenTesting 1.html 114 bytes
  21. 2. Fundamentals/1.2 Kali Linux Virtual Machine File - OHU.html 133 bytes
  22. 2. Fundamentals/2. Terminal - Few Survival Commands to know (Optional).html 6.5 KB
  23. 2. Fundamentals/3. Terminal - Tips and Tricks you should apply now (Optional).html 2.0 KB
  24. 2. Fundamentals/4. Theoretical Basics [EXTREMELY IMPORTANT].mp4 184.3 MB
  25. 2. Fundamentals/4. Theoretical Basics [EXTREMELY IMPORTANT].srt 37.3 KB
  26. 3. Information Gathering/1. Passive Reconnaissance - Part 1.mp4 113.5 MB
  27. 3. Information Gathering/1. Passive Reconnaissance - Part 1.srt 15.0 KB
  28. 3. Information Gathering/2. Passive Reconnaissance - Part 2.mp4 136.7 MB
  29. 3. Information Gathering/2. Passive Reconnaissance - Part 2.srt 16.0 KB
  30. 3. Information Gathering/3. Passive Reconnaissance - Part 3.mp4 129.4 MB
  31. 3. Information Gathering/3. Passive Reconnaissance - Part 3.srt 14.7 KB
  32. 3. Information Gathering/4. Store Passive Data in the Right Way.html 4.0 KB
  33. 3. Information Gathering/5. Active Reconnaissance - Part 1.mp4 87.3 MB
  34. 3. Information Gathering/5. Active Reconnaissance - Part 1.srt 13.2 KB
  35. 3. Information Gathering/6. Active Reconnaissance - Part 2.mp4 118.5 MB
  36. 3. Information Gathering/6. Active Reconnaissance - Part 2.srt 17.4 KB
  37. 3. Information Gathering/7. Active Reconnaissance - Part 3.mp4 75.8 MB
  38. 3. Information Gathering/7. Active Reconnaissance - Part 3.srt 13.7 KB
  39. 3. Information Gathering/8. Store Active Data in the Right Way.html 662 bytes
  40. 3. Information Gathering/8.1 Target DB.xlsx 10.4 KB
  41. 4. Vulnerability Analysis/1. What is a Vulnerability Assessment.html 995 bytes
  42. 4. Vulnerability Analysis/2. Manually Identify, Analyze and Rank Vulnerabilities.mp4 235.2 MB
  43. 4. Vulnerability Analysis/2. Manually Identify, Analyze and Rank Vulnerabilities.srt 33.6 KB
  44. 4. Vulnerability Analysis/3. Automated Vulnerability Assessment using Nessus.mp4 157.4 MB
  45. 4. Vulnerability Analysis/3. Automated Vulnerability Assessment using Nessus.srt 28.9 KB
  46. 4. Vulnerability Analysis/4. Automated Vulnerability Assessment - Nmap & VEGA.mp4 60.4 MB
  47. 4. Vulnerability Analysis/4. Automated Vulnerability Assessment - Nmap & VEGA.srt 12.8 KB
  48. 5. Exploitation/1. LAB 1 - Exploitation with Metasploit Framework.mp4 258.8 MB
  49. 5. Exploitation/1. LAB 1 - Exploitation with Metasploit Framework.srt 42.4 KB
  50. 5. Exploitation/2. LAB 2 - Exploitation using Manual Public Exploits.mp4 224.7 MB
  51. 5. Exploitation/2. LAB 2 - Exploitation using Manual Public Exploits.srt 39.0 KB
  52. 5. Exploitation/3. Essential Things You Should Know.html 1.1 KB
  53. 6. Web Penetration Test/1. CMS Hacking - Initial Information Gathering.mp4 111.6 MB
  54. 6. Web Penetration Test/1. CMS Hacking - Initial Information Gathering.srt 19.3 KB
  55. 6. Web Penetration Test/10. Part 2 Web Server Hacking Risky PUT & DELETE Methods.mp4 120.0 MB
  56. 6. Web Penetration Test/10. Part 2 Web Server Hacking Risky PUT & DELETE Methods.srt 18.4 KB
  57. 6. Web Penetration Test/11. Part 3 Web Server Hacking SSH Brute Forcing w Hydra.mp4 57.7 MB
  58. 6. Web Penetration Test/11. Part 3 Web Server Hacking SSH Brute Forcing w Hydra.srt 11.5 KB
  59. 6. Web Penetration Test/2. CMS Hacking - Directory Busting and CMS Scanning.mp4 111.5 MB
  60. 6. Web Penetration Test/2. CMS Hacking - Directory Busting and CMS Scanning.srt 18.2 KB
  61. 6. Web Penetration Test/3. CMS Hacking - General Brute Forcing & Exploitation.mp4 237.5 MB
  62. 6. Web Penetration Test/3. CMS Hacking - General Brute Forcing & Exploitation.srt 33.9 KB
  63. 6. Web Penetration Test/4. Do you know the Power of Version Numbers - Part 1.mp4 179.9 MB
  64. 6. Web Penetration Test/4. Do you know the Power of Version Numbers - Part 1.srt 24.7 KB
  65. 6. Web Penetration Test/5. Do you know the Power of Version Numbers - Part 2.mp4 124.8 MB
  66. 6. Web Penetration Test/5. Do you know the Power of Version Numbers - Part 2.srt 19.2 KB
  67. 6. Web Penetration Test/6. Important Specific Vulnerabilities such as SQL Injection in-depth.mp4 194.9 MB
  68. 6. Web Penetration Test/6. Important Specific Vulnerabilities such as SQL Injection in-depth.srt 34.9 KB
  69. 6. Web Penetration Test/7. Important Specific Vulnerabilities such as XSS in-depth.mp4 144.7 MB
  70. 6. Web Penetration Test/7. Important Specific Vulnerabilities such as XSS in-depth.srt 21.7 KB
  71. 6. Web Penetration Test/8. Important Specific Vulnerabilities such as File Upload & Command Injection.mp4 123.7 MB
  72. 6. Web Penetration Test/8. Important Specific Vulnerabilities such as File Upload & Command Injection.srt 18.6 KB
  73. 6. Web Penetration Test/9. Part 1 Web Server Hacking Intro & Enumeration Ideas.mp4 123.6 MB
  74. 6. Web Penetration Test/9. Part 1 Web Server Hacking Intro & Enumeration Ideas.srt 16.5 KB
  75. 7. Network PenTesting/1. Upcoming Lectures with their Exact Release Date!.html 1.5 KB
  76. 7. Network PenTesting/10. Privilege Escalation Techniques - Part 3.mp4 55.4 MB
  77. 7. Network PenTesting/10. Privilege Escalation Techniques - Part 3.srt 10.0 KB
  78. 7. Network PenTesting/11. Privilege Escalation Techniques - Part 4.mp4 167.2 MB
  79. 7. Network PenTesting/11. Privilege Escalation Techniques - Part 4.srt 19.9 KB
  80. 7. Network PenTesting/13. Spawning Stable Shells.html 2.3 KB
  81. 7. Network PenTesting/2. The Core of Network Testing - Part 1.mp4 128.8 MB
  82. 7. Network PenTesting/2. The Core of Network Testing - Part 1.srt 21.5 KB
  83. 7. Network PenTesting/3. The Core of Network Testing - Part 2.mp4 213.4 MB
  84. 7. Network PenTesting/3. The Core of Network Testing - Part 2.srt 23.2 KB
  85. 7. Network PenTesting/4. The Core of Network Testing - Part 3.mp4 101.4 MB
  86. 7. Network PenTesting/4. The Core of Network Testing - Part 3.srt 14.2 KB
  87. 7. Network PenTesting/5. Post Exploitation using Metasploit - Part 1.mp4 114.0 MB
  88. 7. Network PenTesting/5. Post Exploitation using Metasploit - Part 1.srt 17.6 KB
  89. 7. Network PenTesting/6. Post Exploitation using Metasploit - Part 2.mp4 81.2 MB
  90. 7. Network PenTesting/6. Post Exploitation using Metasploit - Part 2.srt 15.2 KB
  91. 7. Network PenTesting/7. Post Exploitation using Metasploit - Part 3.mp4 79.3 MB
  92. 7. Network PenTesting/7. Post Exploitation using Metasploit - Part 3.srt 13.9 KB
  93. 7. Network PenTesting/8. Privilege Escalation Techniques - Part 1.mp4 158.3 MB
  94. 7. Network PenTesting/8. Privilege Escalation Techniques - Part 1.srt 22.7 KB
  95. 7. Network PenTesting/9. Privilege Escalation Techniques - Part 2.mp4 142.7 MB
  96. 7. Network PenTesting/9. Privilege Escalation Techniques - Part 2.srt 22.3 KB
  97. 8. Security Controls Evasion/1. Upcoming Lectures with their Exact Release Date!.html 1.0 KB
  98. 8. Security Controls Evasion/2. Introduction to Virus and Antivirus Software.html 3.1 KB
  99. 8. Security Controls Evasion/3. #1 Bypass Antivirus - Making the Base Payload.mp4 65.2 MB
  100. 8. Security Controls Evasion/3. #1 Bypass Antivirus - Making the Base Payload.srt 14.4 KB
  101. 8. Security Controls Evasion/4. #2 Bypass Antivirus - The Actual Evasion Technique!.mp4 221.4 MB
  102. 8. Security Controls Evasion/4. #2 Bypass Antivirus - The Actual Evasion Technique!.srt 27.5 KB
  103. 9. Writing Great Reports/1. Clean Documentation in a Professional Test.mp4 141.1 MB
  104. 9. Writing Great Reports/1. Clean Documentation in a Professional Test.srt 32.9 KB
  105. 9. Writing Great Reports/2. Report Writing with Perfect Examples.html 990 bytes
  106. 9. Writing Great Reports/2.1 PenTest Report (OHU).docx 973.8 KB
  107. 9. Writing Great Reports/2.2 PenTest Report (OHU).pdf 812.9 KB
  108. FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url 290 bytes