
English | Size: 6.4 GB
Genre: eLearning
Table of Contents
Introduction
Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking: Introduction 00:02:25
Lesson 1: Introduction to Enterprise Penetration Testing and Continuous Monitoring
Learning objectives 00:01:14
1.1 Introducing Red Teams and Enterprise Hacking 00:05:43
1.2 Understanding Enterprise Wide Penetration Testing 00:08:14
1.3 Understanding the Difference Between Red and Blue Teams 00:02:54
1.4 Exploring How to Plan and Fund a Red Team 00:03:23
1.5 Surveying Operational Processes and Policies for the Red Team 00:03:52
1.6 Understanding How to Create and Hire the Red Team 00:02:29
1.7 Understanding Red Team Collaboration 00:02:45
Lesson 2: External and Internal Reconnaissance
Learning objectives 00:00:33
2.1 Understanding the Red Team Environment 00:20:50
2.2 Understanding Passive Recon 00:02:39
Lesson 3: Enterprise Social Engineering
Learning objectives 00:00:25
3.1 Surveying Social Engineering Methodologies 00:04:13
3.2 Understanding How to Target Employees 00:02:51
3.3 Exploiting Social Engineering Tools 00:08:02
Lesson 4: Network and Vulnerability Scanning
Learning objectives 00:00:43
4.1 Exploring Network and Vulnerability Scanning Methodologies 00:03:51
4.2 Understanding the Operational Impact of Enterprise-wide Scanning 00:09:40
4.3 Understanding Scanning Tools 00:04:34
4.4 Exploring How to Automate Scans 00:07:42
4.5 Using Shodan and Its API 00:03:30
4.6 Exploring Vulnerability Scanners 00:10:22
4.7 Understanding Binary and Source Code Scanners 00:02:45
4.8 Understanding How to Perform Continuous Monitoring 00:03:33
Lesson 5: Web App Testing
Learning objectives 00:00:31
5.1 Exploring How to Target Hosts 00:05:36
5.2 Exploring Web App Testing Essential Tools 00:07:38
5.3 Understanding Enterprise Application Continuous Testing 00:03:37
Lesson 6: Internal Testing
Learning objectives 00:00:22
6.1 Understanding How to Initially Get on the Network 00:02:52
6.2 Understanding What Hosts to Target and the Scope of the Testing 00:06:37
6.3 Exploring the Hidden Cost of Open Source Software 00:04:04
6.4 Learning How to Host Enterprise Capture the Flag Events 00:03:17
Lesson 7: Privilege Escalation
Learning objectives 00:00:34
7.1 Learning Privilege Escalation Methodologies 00:06:51
7.2 Understanding Lateral Movement 00:04:15
7.3 Surveying Privilege Escalation Essential Tools 00:02:37
Lesson 8: Enterprise Secrets, Post Exploitation, and Data Exfiltration
Learning objectives 00:01:00
8.1 Understanding Persistent Access 00:02:03
8.2 Learning How to Achieve Domain Admin Access 00:02:54
8.3 Understanding How to Compromise User Credentials 00:05:25
8.4 Surveying Password Cracking & Reporting 00:02:58
8.5 Understanding That Domain Admin Is Not the End Goal 00:01:08
8.6 Searching for Sensitive Data 00:04:37
8.7 Understanding Data Exfiltration Techniques 00:07:44
8.8 Understanding How to Cover Your Tracks 00:04:01
Lesson 9 Cloud Services
Learning objectives 00:00:27
9.1 Understanding the Challenge of Testing Cloud Services 00:03:50
9.2 Exploring How to Test in the Cloud 00:03:33
Lesson 10 Reporting & Continuous Evaluation
Learning objectives 00:00:28
10.1 Surveying Final Reports for Transactional Penetration Testing Events 00:04:25
10.2 Surveying Continouos Reporting for Enterprise Continuous Monitoring 00:01:50
Summary
Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking: Summary 00:01:48

Download Faster with Resume Support with Premium Account
Rapidgator:
https://rapidgator.net/file/4f1f1ac77bf0bb531214f5ec8aded3b2/LL.Enterprise-Penetration-Testing-and-Continuous-Monitoring-The-Art-of-Hacking.part1.rar.html
https://rapidgator.net/file/9240bba5a77aba5de7e60d6c1eaf7c5a/LL.Enterprise-Penetration-Testing-and-Continuous-Monitoring-The-Art-of-Hacking.part2.rar.html
https://rapidgator.net/file/6a851d995ea87ce56c6dbc9a67dc5e83/LL.Enterprise-Penetration-Testing-and-Continuous-Monitoring-The-Art-of-Hacking.part3.rar.html
https://rapidgator.net/file/515360763312f86021a688c1212f6077/LL.Enterprise-Penetration-Testing-and-Continuous-Monitoring-The-Art-of-Hacking.part4.rar.html
https://rapidgator.net/file/369c755cfed7e3b445a943f973e70e13/LL.Enterprise-Penetration-Testing-and-Continuous-Monitoring-The-Art-of-Hacking.part5.rar.html
NitroFlare:
http://nitroflare.com/view/3BB606C2AE6422C/LL.Enterprise-Penetration-Testing-and-Continuous-Monitoring-The-Art-of-Hacking.part1.rar
http://nitroflare.com/view/FD915A0E75EDBAD/LL.Enterprise-Penetration-Testing-and-Continuous-Monitoring-The-Art-of-Hacking.part2.rar
http://nitroflare.com/view/ABDF6C3D6BAE5AA/LL.Enterprise-Penetration-Testing-and-Continuous-Monitoring-The-Art-of-Hacking.part3.rar
http://nitroflare.com/view/D8352ED023BC28A/LL.Enterprise-Penetration-Testing-and-Continuous-Monitoring-The-Art-of-Hacking.part4.rar
http://nitroflare.com/view/3C601BBE3CE7296/LL.Enterprise-Penetration-Testing-and-Continuous-Monitoring-The-Art-of-Hacking.part5.rar
If any links die or problem unrar, send request to https://forms.gle/e557HbjJ5vatekDV9
Leave a Reply