У нас вы можете посмотреть бесплатно CompTIA PenTest+ Full Course - FREE [11 Hours] PT0-002 или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
A complete CompTIA PentTest+ course featuring theory and follow-along labs. 💻 cyber security tutorial 💻 top 10 cyber security certifications 💻 information technology , it jobs 💻 how to start cyber security , coding Buy the lab book on Amazon - https://amzn.to/3iJyGG1 Join ▶️ www.howtonetwork.com Use this special URL to get 30 days of access for $1 - https://www.howtonetwork.com/youtube Here is the 101 Labs website featuring lab courses, practice exams and live Cisco racks for members. https://www.101labs.net Use coupon code 'youtube' for deal. #pentester #cybersecurity #comptia 00:00:00 - The CompTIA Pentest+ Exam 00:11:27 - Pentesting Module 2 - Planning and Scoping 00:37:20 - Explain the Importance of Planning for an Engagement. 01:28:06 - Explain Key Legal Concepts Module 3 - Information Gathering 01:48:55 - Passive Information Gathering, Reconnaissance and Enumeration 02:07:52 - Passive Information Gathering Tools 02:29:31 - Reconnaissance Tools Module 4 - Vulnerability Scanning 03:04:28 - Vulnerability Management 03:22:14 - Vulnerability Scan Tools Module 5 - Vulnerability Analysis 04:11:19 - Interpreting Vulnerabilities Reports Module 6 - Exploits 04:55:40 - Exploit Types 05:20:37 - Metasploitable and Exploits DBs 05:32:37 - The Metasploit Framework Module 7 - Exploiting Networks 05:54:22 - Network Exploits 06:27:42 - NetBIOS Exploits 06:38:58 - Wireless Exploits 06:50:38 - Some Network Exploitation Tools Module 8 - Exploiting People 07:15:41 - Social Engineering 07:34:00 - Social Engineering Toolkit Module 9 - Exploiting Applications 07:49:27 - Exploiting Applications 08:24:18 - Injection Tools Module 10 - Exploiting Hosts 08:41:13 - Special Permission Bits in Linux 09:08:11 - Exploiting Windows Hashes and Kernel 09:35:27 - Exploiting Linux Kernels Module 11 - Using and Writing Pentesting Scripts 10:02:15 - Scripting in Bash, Powershell, Python and Ruby Module 12 - Reporting 10:53:21 - Reporting and Monitoring