[ CoursePig.com ] Linkedin - CompTIA Pentest + (PT0-002) Cert Prep - 3 Attacks and Exploits (2022)

File Type Create Time File Size Seeders Leechers Updated
Movie 2022-09-21 3.77GB 1 0 3 weeks ago
Download
Magnet link   or   Save Instantly without Torrenting   or   Torrent download

To download this file, you need a free bitTorrent client such as qBittorrent.

Report Abuse
Tags
CoursePig  com  Linkedin  CompTIA  Pentest  PT0  002  Cert  Prep  Attacks  and  Exploits  2022  
Related Torrents
  1. Santos O. CompTIA PenTest+ PT0-002 Cert Guide 2ed 2022 34.39MB
  2. [ FreeCourseWeb.com ] CompTIA PenTest + PT0-002 Cert Guide, 2nd Edition (PDF) 34.39MB
  3. [ CourseWikia.com ] Linkedin - CompTIA Security + (SY0-701) Cert Prep - 3 Security Architecture 501.99MB
  4. [ DevCourseWeb.com ] Linkedin - CompTIA Security + (SY0-701) Cert Prep - 1 General Security Concepts 309.25MB
  5. [ CourseBoat.com ] Linkedin - CompTIA Data + (DA0-001) Cert Prep - Data Governance, Quality, and Controls 221.52MB
  6. [ CourseWikia.com ] Linkedin - CompTIA Data + (DA0-001) Cert Prep - Data Analysis 524.05MB
  7. [ CourseMega.com ] Linkedin - Cisco Certified CyberOps Associate Cert Prep - 5 Security Policies and Procedures 663.32MB
  8. [ CoursePig.com ] Linkedin - SketchUp Pro 2022 Essential Training 773.78MB
  9. [ FreeCourseWeb.com ] Linkedin - Google Cloud Digital Leader Cert Prep 2 - Exploring Data Transformation with Google Cloud 79.18MB
  10. Gu a de estudio de la certificaci n CompTIA PenTest PT0 001 - Downloader.exe 782.95KB
Files
  1. Get Bonus Downloads Here.url 179B
  2. ~Get Your Files Here !/01 - 1. Network-Based Attacks/01 - Exploit resources and network attacks.mp4 84.72MB
  3. ~Get Your Files Here !/01 - 1. Network-Based Attacks/01 - Exploit resources and network attacks.srt 7.56KB
  4. ~Get Your Files Here !/01 - 1. Network-Based Attacks/02 - Network-based exploits.mp4 83.97MB
  5. ~Get Your Files Here !/01 - 1. Network-Based Attacks/02 - Network-based exploits.srt 12.53KB
  6. ~Get Your Files Here !/01 - 1. Network-Based Attacks/03 - FTP exploit demo.mp4 81.26MB
  7. ~Get Your Files Here !/01 - 1. Network-Based Attacks/03 - FTP exploit demo.srt 12.21KB
  8. ~Get Your Files Here !/01 - 1. Network-Based Attacks/04 - Man-in-the-middle exploits.mp4 85.91MB
  9. ~Get Your Files Here !/01 - 1. Network-Based Attacks/04 - Man-in-the-middle exploits.srt 11.43KB
  10. ~Get Your Files Here !/01 - 1. Network-Based Attacks/05 - Labtainers lab TCPIP attacks.mp4 35.04MB
  11. ~Get Your Files Here !/01 - 1. Network-Based Attacks/05 - Labtainers lab TCPIP attacks.srt 3.43KB
  12. ~Get Your Files Here !/01 - 1. Network-Based Attacks/06 - Labtainers lab ARP spoof attack.mp4 21.98MB
  13. ~Get Your Files Here !/01 - 1. Network-Based Attacks/06 - Labtainers lab ARP spoof attack.srt 3.01KB
  14. ~Get Your Files Here !/01 - 1. Network-Based Attacks/07 - Labtainers lab Local DNS attacks.mp4 22.09MB
  15. ~Get Your Files Here !/01 - 1. Network-Based Attacks/07 - Labtainers lab Local DNS attacks.srt 2.63KB
  16. ~Get Your Files Here !/01 - 1. Network-Based Attacks/08 - Labtainers lab MACs and hash functions.mp4 16.88MB
  17. ~Get Your Files Here !/01 - 1. Network-Based Attacks/08 - Labtainers lab MACs and hash functions.srt 2.41KB
  18. ~Get Your Files Here !/02 - 2. Wireless and RF Attacks/01 - Wireless exploits, part 1.mp4 158.47MB
  19. ~Get Your Files Here !/02 - 2. Wireless and RF Attacks/01 - Wireless exploits, part 1.srt 22.36KB
  20. ~Get Your Files Here !/02 - 2. Wireless and RF Attacks/02 - Wireless exploits, part 2.mp4 28.77MB
  21. ~Get Your Files Here !/02 - 2. Wireless and RF Attacks/02 - Wireless exploits, part 2.srt 4.49KB
  22. ~Get Your Files Here !/02 - 2. Wireless and RF Attacks/03 - Antennas.mp4 66.63MB
  23. ~Get Your Files Here !/02 - 2. Wireless and RF Attacks/03 - Antennas.srt 6.15KB
  24. ~Get Your Files Here !/03 - 3. Web and Database Attacks/01 - OWASP Top 10.mp4 160.60MB
  25. ~Get Your Files Here !/03 - 3. Web and Database Attacks/01 - OWASP Top 10.srt 13.88KB
  26. ~Get Your Files Here !/03 - 3. Web and Database Attacks/02 - Application exploits, part 1.mp4 64.33MB
  27. ~Get Your Files Here !/03 - 3. Web and Database Attacks/02 - Application exploits, part 1.srt 8.81KB
  28. ~Get Your Files Here !/03 - 3. Web and Database Attacks/03 - SQL injection demo.mp4 84.48MB
  29. ~Get Your Files Here !/03 - 3. Web and Database Attacks/03 - SQL injection demo.srt 13.19KB
  30. ~Get Your Files Here !/03 - 3. Web and Database Attacks/04 - Labtainers lab SQL injection.mp4 32.63MB
  31. ~Get Your Files Here !/03 - 3. Web and Database Attacks/04 - Labtainers lab SQL injection.srt 4.36KB
  32. ~Get Your Files Here !/03 - 3. Web and Database Attacks/05 - Application exploits, part 2.mp4 95.09MB
  33. ~Get Your Files Here !/03 - 3. Web and Database Attacks/05 - Application exploits, part 2.srt 13.77KB
  34. ~Get Your Files Here !/03 - 3. Web and Database Attacks/06 - Application exploits, part 3.mp4 107.41MB
  35. ~Get Your Files Here !/03 - 3. Web and Database Attacks/06 - Application exploits, part 3.srt 14.65KB
  36. ~Get Your Files Here !/03 - 3. Web and Database Attacks/07 - Cross-site scripting demo.mp4 65.45MB
  37. ~Get Your Files Here !/03 - 3. Web and Database Attacks/07 - Cross-site scripting demo.srt 11.12KB
  38. ~Get Your Files Here !/03 - 3. Web and Database Attacks/08 - Labtainers lab Cross-site scripting.mp4 20.06MB
  39. ~Get Your Files Here !/03 - 3. Web and Database Attacks/08 - Labtainers lab Cross-site scripting.srt 2.70KB
  40. ~Get Your Files Here !/03 - 3. Web and Database Attacks/09 - Labtainers lab Cross-site request forgery.mp4 16.79MB
  41. ~Get Your Files Here !/03 - 3. Web and Database Attacks/09 - Labtainers lab Cross-site request forgery.srt 1.86KB
  42. ~Get Your Files Here !/03 - 3. Web and Database Attacks/10 - Code vulnerabilities.mp4 197.77MB
  43. ~Get Your Files Here !/03 - 3. Web and Database Attacks/10 - Code vulnerabilities.srt 29.52KB
  44. ~Get Your Files Here !/03 - 3. Web and Database Attacks/11 - API attacks and attack resources.mp4 113.45MB
  45. ~Get Your Files Here !/03 - 3. Web and Database Attacks/11 - API attacks and attack resources.srt 9.85KB
  46. ~Get Your Files Here !/03 - 3. Web and Database Attacks/12 - Privilege escalation Linux.mp4 113.56MB
  47. ~Get Your Files Here !/03 - 3. Web and Database Attacks/12 - Privilege escalation Linux.srt 15.71KB
  48. ~Get Your Files Here !/03 - 3. Web and Database Attacks/13 - Privilege escalation Windows.mp4 71.74MB
  49. ~Get Your Files Here !/03 - 3. Web and Database Attacks/13 - Privilege escalation Windows.srt 11.28KB
  50. ~Get Your Files Here !/03 - 3. Web and Database Attacks/14 - Miscellaneous privilege escalation.mp4 97.31MB
  51. ~Get Your Files Here !/03 - 3. Web and Database Attacks/14 - Miscellaneous privilege escalation.srt 12.39KB
  52. ~Get Your Files Here !/03 - 3. Web and Database Attacks/15 - Miscellaneous local host vulnerabilities.mp4 95.50MB
  53. ~Get Your Files Here !/03 - 3. Web and Database Attacks/15 - Miscellaneous local host vulnerabilities.srt 13.29KB
  54. ~Get Your Files Here !/04 - 4. Attacking the Cloud/01 - Cloud attacks, part 1.mp4 68.60MB
  55. ~Get Your Files Here !/04 - 4. Attacking the Cloud/01 - Cloud attacks, part 1.srt 7.68KB
  56. ~Get Your Files Here !/04 - 4. Attacking the Cloud/02 - Cloud attacks, part 2.mp4 88.03MB
  57. ~Get Your Files Here !/04 - 4. Attacking the Cloud/02 - Cloud attacks, part 2.srt 7.54KB
  58. ~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/01 - Mobile attacks.mp4 193.51MB
  59. ~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/01 - Mobile attacks.srt 16.46KB
  60. ~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/02 - IoT attacks.mp4 196.30MB
  61. ~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/02 - IoT attacks.srt 16.44KB
  62. ~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/03 - Data storage and management interface attacks.mp4 167.51MB
  63. ~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/03 - Data storage and management interface attacks.srt 13.99KB
  64. ~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/04 - Virtual and containerized environment attacks.mp4 137.21MB
  65. ~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/04 - Virtual and containerized environment attacks.srt 11.47KB
  66. ~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/05 - Labtainers lab Industrial control system.mp4 26.15MB
  67. ~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/05 - Labtainers lab Industrial control system.srt 2.78KB
  68. ~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/01 - Pretext for a social engineering attack.mp4 41.85MB
  69. ~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/01 - Pretext for a social engineering attack.srt 3.82KB
  70. ~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/02 - Remote social engineering.mp4 72.18MB
  71. ~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/02 - Remote social engineering.srt 9.65KB
  72. ~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/03 - Spear phishing demo.mp4 106.76MB
  73. ~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/03 - Spear phishing demo.srt 16.30KB
  74. ~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/04 - In-person social engineering.mp4 140.54MB
  75. ~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/04 - In-person social engineering.srt 19.12KB
  76. ~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/05 - Physical security.mp4 133.31MB
  77. ~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/05 - Physical security.srt 20.26KB
  78. ~Get Your Files Here !/07 - 7. Post-Exploitation/01 - Post-exploitation techniques.mp4 116.87MB
  79. ~Get Your Files Here !/07 - 7. Post-Exploitation/01 - Post-exploitation techniques.srt 18.08KB
  80. ~Get Your Files Here !/07 - 7. Post-Exploitation/02 - Post-exploitation tools.mp4 58.22MB
  81. ~Get Your Files Here !/07 - 7. Post-Exploitation/02 - Post-exploitation tools.srt 5.49KB
  82. ~Get Your Files Here !/07 - 7. Post-Exploitation/03 - Network segmentation testing.mp4 53.98MB
  83. ~Get Your Files Here !/07 - 7. Post-Exploitation/03 - Network segmentation testing.srt 3.94KB
  84. ~Get Your Files Here !/07 - 7. Post-Exploitation/04 - Persistence and stealth.mp4 123.07MB
  85. ~Get Your Files Here !/07 - 7. Post-Exploitation/04 - Persistence and stealth.srt 17.88KB
  86. ~Get Your Files Here !/07 - 7. Post-Exploitation/05 - Detection avoidance techniques.mp4 118.40MB
  87. ~Get Your Files Here !/07 - 7. Post-Exploitation/05 - Detection avoidance techniques.srt 9.52KB
  88. ~Get Your Files Here !/Bonus Resources.txt 386B