首页
磁力链接怎么用
한국어
English
日本語
简体中文
繁體中文
[Tutorialsplanet.NET] Udemy - CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam
文件类型
收录时间
最后活跃
资源热度
文件大小
文件数量
视频
2022-4-15 03:14
2024-12-27 11:14
240
8.14 GB
79
磁力链接
magnet:?xt=urn:btih:b8d9e4fca041abd2178d85883a17fcfb060f2903
迅雷链接
thunder://QUFtYWduZXQ6P3h0PXVybjpidGloOmI4ZDllNGZjYTA0MWFiZDIxNzhkODU4ODNhMTdmY2ZiMDYwZjI5MDNaWg==
二维码链接
种子下载(838888不存储任何种子文件)
种子下载线路1(迅雷)--推荐
种子下载线路2(比特彗星)
种子下载线路3(torcache)
3条线路均为国内外知名下载网站种子链接,内容跟本站无关!
相关链接
Tutorialsplanet
NET
Udemy
-
CompTIA
Pentest
Ethical
Hacking
Course
&
Practice
Exam
文件列表
1. Introduction/1. Welcome to the course!.mp4
75.05MB
1. Introduction/3. Exam Foundations.mp4
87.61MB
2. Domain 1 Planning and Scoping/1. Planning and Scoping (Overview).mp4
26.22MB
2. Domain 1 Planning and Scoping/10. Target Selection.mp4
101.78MB
2. Domain 1 Planning and Scoping/11. Other Scoping Considerations.mp4
129.12MB
2. Domain 1 Planning and Scoping/2. Penetration Testing Methodology.mp4
60.57MB
2. Domain 1 Planning and Scoping/3. Planning a Penetration Test.mp4
152.9MB
2. Domain 1 Planning and Scoping/4. Rules of Engagement.mp4
107.69MB
2. Domain 1 Planning and Scoping/5. Legal Concepts.mp4
195.02MB
2. Domain 1 Planning and Scoping/6. Testing Strategies.mp4
54.86MB
2. Domain 1 Planning and Scoping/7. White Box Support Resources.mp4
119.24MB
2. Domain 1 Planning and Scoping/8. Types of Assessments.mp4
106.17MB
2. Domain 1 Planning and Scoping/9. Threat Actors.mp4
140.21MB
3. Domain 2 Information Gathering and Vulnerability Identification/10. Open Source Research.mp4
115.38MB
3. Domain 2 Information Gathering and Vulnerability Identification/11. Vulnerability Scanning.mp4
168.99MB
3. Domain 2 Information Gathering and Vulnerability Identification/12. Scanning Considerations.mp4
104.52MB
3. Domain 2 Information Gathering and Vulnerability Identification/13. Application and Container Scans.mp4
54.8MB
3. Domain 2 Information Gathering and Vulnerability Identification/14. Analyzing Vulnerability Scans.mp4
136.74MB
3. Domain 2 Information Gathering and Vulnerability Identification/15. Leverage Information for Exploit.mp4
63.73MB
3. Domain 2 Information Gathering and Vulnerability Identification/16. Common Attack Vectors.mp4
121.96MB
3. Domain 2 Information Gathering and Vulnerability Identification/17. Weaknesses in Specialized Systems.mp4
202.45MB
3. Domain 2 Information Gathering and Vulnerability Identification/2. Information Gathering.mp4
189.14MB
3. Domain 2 Information Gathering and Vulnerability Identification/3. Reconnaissance with CentralOps (Demo).mp4
120.54MB
3. Domain 2 Information Gathering and Vulnerability Identification/4. Scanning and Enumeration.mp4
84.23MB
3. Domain 2 Information Gathering and Vulnerability Identification/5. Fingerprinting.mp4
78.75MB
3. Domain 2 Information Gathering and Vulnerability Identification/6. Scanning and Enumeration (Demo).mp4
177.94MB
3. Domain 2 Information Gathering and Vulnerability Identification/7. Cryptographic Inspection.mp4
28.28MB
3. Domain 2 Information Gathering and Vulnerability Identification/8. Eavesdropping.mp4
62.41MB
3. Domain 2 Information Gathering and Vulnerability Identification/9. Decompiling and Debugging.mp4
50.83MB
4. Domain 3 Attacks and Exploits/1. Attacks and Exploits (Overview).mp4
36.58MB
4. Domain 3 Attacks and Exploits/10. Local Host Vulnerabilities.mp4
52.99MB
4. Domain 3 Attacks and Exploits/11. Privilege Escalation (Linux).mp4
86.15MB
4. Domain 3 Attacks and Exploits/12. Privilege Escalation (Windows).mp4
192.71MB
4. Domain 3 Attacks and Exploits/13. Privilege Escalation.mp4
93.77MB
4. Domain 3 Attacks and Exploits/14. Privilege Escalation (Demo).mp4
90.88MB
4. Domain 3 Attacks and Exploits/15. Lateral Movement.mp4
163.68MB
4. Domain 3 Attacks and Exploits/16. Persistence.mp4
125.04MB
4. Domain 3 Attacks and Exploits/17. Covering Your Tracks.mp4
101.57MB
4. Domain 3 Attacks and Exploits/18. Persistence and Covering Tracks (Demo).mp4
107.75MB
4. Domain 3 Attacks and Exploits/2. Social Engineering.mp4
237.92MB
4. Domain 3 Attacks and Exploits/3. Motivation Factors.mp4
138.5MB
4. Domain 3 Attacks and Exploits/4. Physical Security Attacks.mp4
104.96MB
4. Domain 3 Attacks and Exploits/5. Lock Picking (Demo).mp4
26.85MB
4. Domain 3 Attacks and Exploits/6. Network-based Vulnerabilities.mp4
255.21MB
4. Domain 3 Attacks and Exploits/7. Wireless-based Vulnerabilities.mp4
160.21MB
4. Domain 3 Attacks and Exploits/8. Wireless Network Attack (Demo).mp4
77.3MB
4. Domain 3 Attacks and Exploits/9. Application-based Vulnerabilities.mp4
324.38MB
5. Domain 4 Penetration Testing Tools/1. Penetration Testing Tools (Overview).mp4
47.63MB
5. Domain 4 Penetration Testing Tools/10. OSINT.mp4
93.21MB
5. Domain 4 Penetration Testing Tools/11. Wireless.mp4
33.82MB
5. Domain 4 Penetration Testing Tools/12. Web Proxies.mp4
105.91MB
5. Domain 4 Penetration Testing Tools/13. Social Engineering Tools.mp4
23.04MB
5. Domain 4 Penetration Testing Tools/14. Remote Access Tools.mp4
93.92MB
5. Domain 4 Penetration Testing Tools/15. Networking Tools.mp4
31.17MB
5. Domain 4 Penetration Testing Tools/16. Mobile Tools.mp4
41.25MB
5. Domain 4 Penetration Testing Tools/17. Miscellaneous Tools.mp4
85.7MB
5. Domain 4 Penetration Testing Tools/18. Intro to Programming.mp4
52.29MB
5. Domain 4 Penetration Testing Tools/19. Programming Concepts.mp4
405.71MB
5. Domain 4 Penetration Testing Tools/2. Nmap Usage.mp4
194.82MB
5. Domain 4 Penetration Testing Tools/20. BASH Script Example.mp4
79.56MB
5. Domain 4 Penetration Testing Tools/21. Python Script Example.mp4
60.99MB
5. Domain 4 Penetration Testing Tools/22. PowerShell Script Example.mp4
56.66MB
5. Domain 4 Penetration Testing Tools/23. Ruby Script Example.mp4
81.33MB
5. Domain 4 Penetration Testing Tools/3. Nmap Usage (Demo).mp4
96.11MB
5. Domain 4 Penetration Testing Tools/4. Use Cases for Tools.mp4
137.91MB
5. Domain 4 Penetration Testing Tools/5. Scanners.mp4
41.02MB
5. Domain 4 Penetration Testing Tools/6. Credential Testing Tools.mp4
121.24MB
5. Domain 4 Penetration Testing Tools/7. Password Cracking (Demo).mp4
26.18MB
5. Domain 4 Penetration Testing Tools/8. Debuggers.mp4
46.98MB
5. Domain 4 Penetration Testing Tools/9. Software Assurance.mp4
42.06MB
6. Domain 5 Reporting and Communication/1. Reporting and Communication (Overview).mp4
36.25MB
6. Domain 5 Reporting and Communication/2. Pentest Communications.mp4
164.67MB
6. Domain 5 Reporting and Communication/3. Report Writing.mp4
150.94MB
6. Domain 5 Reporting and Communication/4. Mitigation Strategies.mp4
133.06MB
6. Domain 5 Reporting and Communication/5. Post-Report Activities.mp4
85.57MB
6. Domain 5 Reporting and Communication/6. Pentest Report Example.mp4
16.55MB
7. Conclusion/1. Conclusion.mp4
38.26MB
7. Conclusion/2. Creating Your Pentest Lab.mp4
154.55MB
7. Conclusion/3. BONUS Where to go from here.mp4
59.85MB
友情提示
不会用的朋友看这里 把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载! 亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!
违规内容投诉邮箱:
[email protected]
概述 838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题 它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息 838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪 838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统