首页
磁力链接怎么用
한국어
English
日本語
简体中文
繁體中文
[FreeTutorials.Eu] [UDEMY] CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam [FTU]
文件类型
收录时间
最后活跃
资源热度
文件大小
文件数量
视频
2019-1-25 06:25
2024-12-10 08:06
267
8.23 GB
82
磁力链接
magnet:?xt=urn:btih:887476fea88d4c4742b9f188ef827c4f09de2c3c
迅雷链接
thunder://QUFtYWduZXQ6P3h0PXVybjpidGloOjg4NzQ3NmZlYTg4ZDRjNDc0MmI5ZjE4OGVmODI3YzRmMDlkZTJjM2NaWg==
二维码链接
种子下载(838888不存储任何种子文件)
种子下载线路1(迅雷)--推荐
种子下载线路2(比特彗星)
种子下载线路3(torcache)
3条线路均为国内外知名下载网站种子链接,内容跟本站无关!
相关链接
FreeTutorials
Eu
UDEMY
CompTIA
Pentest
Ethical
Hacking
Course
&
Practice
Exam
FTU
文件列表
01 Introduction/001 Welcome to the course.mp4
75.04MB
01 Introduction/002 Exam Foundations.mp4
87.61MB
01 Introduction/003 An Important Message About the Course.mp4
20.23MB
01 Introduction/004 How to Schedule Your Exam.mp4
70.48MB
02 Domain 1 Planning and Scoping/005 Planning and Scoping (Overview).mp4
26.22MB
02 Domain 1 Planning and Scoping/006 Penetration Testing Methodology.mp4
60.57MB
02 Domain 1 Planning and Scoping/007 Planning a Penetration Test.mp4
152.9MB
02 Domain 1 Planning and Scoping/008 Rules of Engagement.mp4
107.68MB
02 Domain 1 Planning and Scoping/009 Legal Concepts.mp4
195.02MB
02 Domain 1 Planning and Scoping/010 Testing Strategies.mp4
54.86MB
02 Domain 1 Planning and Scoping/011 White Box Support Resources.mp4
119.23MB
02 Domain 1 Planning and Scoping/012 Types of Assessments.mp4
106.16MB
02 Domain 1 Planning and Scoping/013 Threat Actors.mp4
140.21MB
02 Domain 1 Planning and Scoping/014 Target Selection.mp4
101.78MB
02 Domain 1 Planning and Scoping/015 Other Scoping Considerations.mp4
129.12MB
03 Domain 2 Information Gathering and Vulnerability Identification/016 Information Gathering and Vulnerability Identification (Overview).mp4
48.42MB
03 Domain 2 Information Gathering and Vulnerability Identification/017 Information Gathering.mp4
189.14MB
03 Domain 2 Information Gathering and Vulnerability Identification/018 Reconnaissance with CentralOps (Demo).mp4
120.53MB
03 Domain 2 Information Gathering and Vulnerability Identification/019 Scanning and Enumeration.mp4
84.22MB
03 Domain 2 Information Gathering and Vulnerability Identification/020 Fingerprinting.mp4
78.74MB
03 Domain 2 Information Gathering and Vulnerability Identification/021 Scanning and Enumeration (Demo).mp4
177.94MB
03 Domain 2 Information Gathering and Vulnerability Identification/022 Cryptographic Inspection.mp4
28.27MB
03 Domain 2 Information Gathering and Vulnerability Identification/023 Eavesdropping.mp4
62.4MB
03 Domain 2 Information Gathering and Vulnerability Identification/024 Decompiling and Debugging.mp4
50.83MB
03 Domain 2 Information Gathering and Vulnerability Identification/025 Open Source Research.mp4
115.38MB
03 Domain 2 Information Gathering and Vulnerability Identification/026 Vulnerability Scanning.mp4
168.98MB
03 Domain 2 Information Gathering and Vulnerability Identification/027 Scanning Considerations.mp4
104.51MB
03 Domain 2 Information Gathering and Vulnerability Identification/028 Application and Container Scans.mp4
54.79MB
03 Domain 2 Information Gathering and Vulnerability Identification/029 Analyzing Vulnerability Scans.mp4
136.73MB
03 Domain 2 Information Gathering and Vulnerability Identification/030 Leverage Information for Exploit.mp4
63.72MB
03 Domain 2 Information Gathering and Vulnerability Identification/031 Common Attack Vectors.mp4
121.95MB
03 Domain 2 Information Gathering and Vulnerability Identification/032 Weaknesses in Specialized Systems.mp4
202.45MB
04 Domain 3 Attacks and Exploits/033 Attacks and Exploits (Overview).mp4
36.57MB
04 Domain 3 Attacks and Exploits/034 Social Engineering.mp4
237.92MB
04 Domain 3 Attacks and Exploits/035 Motivation Factors.mp4
138.49MB
04 Domain 3 Attacks and Exploits/036 Physical Security Attacks.mp4
104.95MB
04 Domain 3 Attacks and Exploits/037 Lock Picking (Demo).mp4
26.85MB
04 Domain 3 Attacks and Exploits/038 Network-based Vulnerabilities.mp4
255.2MB
04 Domain 3 Attacks and Exploits/039 Wireless-based Vulnerabilities.mp4
160.2MB
04 Domain 3 Attacks and Exploits/040 Wireless Network Attack (Demo).mp4
77.29MB
04 Domain 3 Attacks and Exploits/041 Application-based Vulnerabilities.mp4
324.37MB
04 Domain 3 Attacks and Exploits/042 Local Host Vulnerabilities.mp4
52.98MB
04 Domain 3 Attacks and Exploits/043 Privilege Escalation (Linux).mp4
86.14MB
04 Domain 3 Attacks and Exploits/044 Privilege Escalation (Windows).mp4
192.71MB
04 Domain 3 Attacks and Exploits/045 Privilege Escalation.mp4
93.77MB
04 Domain 3 Attacks and Exploits/046 Privilege Escalation (Demo).mp4
90.88MB
04 Domain 3 Attacks and Exploits/047 Lateral Movement.mp4
163.68MB
04 Domain 3 Attacks and Exploits/048 Persistence.mp4
125.03MB
04 Domain 3 Attacks and Exploits/049 Covering Your Tracks.mp4
101.56MB
04 Domain 3 Attacks and Exploits/050 Persistence and Covering Tracks (Demo).mp4
107.75MB
05 Domain 4 Penetration Testing Tools/051 Penetration Testing Tools (Overview).mp4
47.63MB
05 Domain 4 Penetration Testing Tools/052 Nmap Usage.mp4
194.82MB
05 Domain 4 Penetration Testing Tools/053 Nmap Usage (Demo).mp4
96.1MB
05 Domain 4 Penetration Testing Tools/054 Use Cases for Tools.mp4
137.91MB
05 Domain 4 Penetration Testing Tools/055 Scanners.mp4
41.02MB
05 Domain 4 Penetration Testing Tools/056 Credential Testing Tools.mp4
121.23MB
05 Domain 4 Penetration Testing Tools/057 Password Cracking (Demo).mp4
26.18MB
05 Domain 4 Penetration Testing Tools/058 Debuggers.mp4
46.97MB
05 Domain 4 Penetration Testing Tools/059 Software Assurance.mp4
42.05MB
05 Domain 4 Penetration Testing Tools/060 OSINT.mp4
93.2MB
05 Domain 4 Penetration Testing Tools/061 Wireless.mp4
33.82MB
05 Domain 4 Penetration Testing Tools/062 Web Proxies.mp4
105.91MB
05 Domain 4 Penetration Testing Tools/063 Social Engineering Tools.mp4
23.04MB
05 Domain 4 Penetration Testing Tools/064 Remote Access Tools.mp4
93.92MB
05 Domain 4 Penetration Testing Tools/065 Networking Tools.mp4
31.17MB
05 Domain 4 Penetration Testing Tools/066 Mobile Tools.mp4
41.25MB
05 Domain 4 Penetration Testing Tools/067 Miscellaneous Tools.mp4
85.7MB
05 Domain 4 Penetration Testing Tools/068 Intro to Programming.mp4
52.29MB
05 Domain 4 Penetration Testing Tools/069 Programming Concepts.mp4
405.71MB
05 Domain 4 Penetration Testing Tools/070 BASH Script Example.mp4
79.56MB
05 Domain 4 Penetration Testing Tools/071 Python Script Example.mp4
60.99MB
05 Domain 4 Penetration Testing Tools/072 PowerShell Script Example.mp4
56.66MB
05 Domain 4 Penetration Testing Tools/073 Ruby Script Example.mp4
81.33MB
06 Domain 5 Reporting and Communication/074 Reporting and Communication (Overview).mp4
36.25MB
06 Domain 5 Reporting and Communication/075 Pentest Communications.mp4
164.67MB
06 Domain 5 Reporting and Communication/076 Report Writing.mp4
150.94MB
06 Domain 5 Reporting and Communication/077 Mitigation Strategies.mp4
133.05MB
06 Domain 5 Reporting and Communication/078 Post-Report Activities.mp4
85.57MB
06 Domain 5 Reporting and Communication/079 Pentest Report Example.mp4
16.55MB
07 Conclusion/080 Conclusion.mp4
38.26MB
07 Conclusion/081 Creating Your Pentest Lab.mp4
154.54MB
07 Conclusion/082 BONUS Congratulations on Completing the Course.mp4
16.66MB
友情提示
不会用的朋友看这里 把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载! 亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!
违规内容投诉邮箱:
[email protected]
概述 838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题 它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息 838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪 838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统