Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
30B |
1 |
52B |
10 |
74.63KB |
100 |
434.70KB |
100 - Python Scripts.mp4 |
32.17MB |
100 - Python Scripts English.vtt |
7.61KB |
101 |
732.31KB |
101 - Scripting Languages Comparison.mp4 |
66.30MB |
101 - Scripting Languages Comparison English.vtt |
13.37KB |
102 |
891.44KB |
102 - Data Structures Part 1.mp4 |
65.61MB |
102 - Data Structures Part 1 English.vtt |
9.10KB |
103 |
155.11KB |
103 - Data Structures Part 2.mp4 |
92.38MB |
103 - Data Structures Part 2 English.vtt |
10.12KB |
104 |
947.43KB |
104 - Libraries.mp4 |
24.66MB |
104 - Libraries English.vtt |
3.26KB |
105 |
257.68KB |
105 - Classes.mp4 |
106.04MB |
105 - Classes English.vtt |
9.50KB |
106 |
535.28KB |
106 - Procedures and Functions.mp4 |
41.74MB |
106 - Procedures and Functions English.vtt |
6.88KB |
107 |
784.53KB |
107 - Perl and JavaScript.mp4 |
19.07MB |
107 - Perl and JavaScript English.vtt |
6.60KB |
108 |
437.30KB |
108 - Chapter12ToolsInventoryHandout.pdf |
933.45KB |
108 - Pen Testing Toolbox.mp4 |
71.90MB |
108 - Pen Testing Toolbox English.vtt |
7.21KB |
109 |
180.75KB |
109 - Using Kali Linux.mp4 |
62.67MB |
109 - Using Kali Linux English.vtt |
8.08KB |
10 - Chapter 10 Quiz.html |
0B |
10 - Service Provider Agreements.mp4 |
10.72MB |
10 - Service Provider Agreements English.vtt |
2.37KB |
11 |
94.72KB |
110 |
754.43KB |
110 - Scanners & Credential Tools.mp4 |
91.89MB |
110 - Scanners & Credential Tools English.vtt |
11.57KB |
111 |
950.65KB |
111 - Code.mp4 |
38.15MB |
111 - Code English.vtt |
5.24KB |
112 |
965.05KB |
112 - Open.mp4 |
84.02MB |
112 - Open English.vtt |
7.65KB |
113 |
933.31KB |
113 - Wireless and Web Pen Testing Tools.mp4 |
87.09MB |
113 - Wireless and Web Pen Testing Tools English.vtt |
12.80KB |
114 |
298.24KB |
114 - Remote Access Tools.mp4 |
69.43MB |
114 - Remote Access Tools English.vtt |
7.29KB |
115 |
364.42KB |
115 - Analyzers and Mobile Pen Testing Tools.mp4 |
23.32MB |
115 - Analyzers and Mobile Pen Testing Tools English.vtt |
2.96KB |
116 |
542.42KB |
116 - Other Pen Testing Tools.mp4 |
38.87MB |
116 - Other Pen Testing Tools English.vtt |
5.34KB |
117 |
852.99KB |
117 - Labtainers Lab Metasploit Framework.mp4 |
16.06MB |
117 - Labtainers Lab Metasploit Framework English.vtt |
2.28KB |
118 |
289.66KB |
118 - Labtainers Lab Wireshark Packet Inspection.mp4 |
14.47MB |
118 - Labtainers Lab Wireshark Packet Inspection English.vtt |
1.82KB |
119 |
31.01KB |
119 - Labtainers Lab SSH.mp4 |
8.06MB |
119 - Labtainers Lab SSH English.vtt |
968B |
11 - Chapter 11 Quiz.html |
0B |
11 - Standards and Methodologies Part 1.mp4 |
66.18MB |
11 - Standards and Methodologies Part 1 English.vtt |
7.58KB |
12 |
64.65KB |
120 |
962.78KB |
120 - Scanners Debuggers and Wireless Tools.mp4 |
79.39MB |
120 - Scanners Debuggers and Wireless Tools English.vtt |
11.07KB |
121 |
725.05KB |
121 - Web Steganography and Cloud Tools.mp4 |
48.36MB |
121 - Web Steganography and Cloud Tools English.vtt |
10.42KB |
12 - Chapter 12 Quiz.html |
0B |
12 - Standards and Methodologies Part 2.mp4 |
88.70MB |
12 - Standards and Methodologies Part 2 English.vtt |
10.37KB |
13 |
2.21KB |
13 - Environmental and Scoping Considerations.mp4 |
97.95MB |
13 - Environmental and Scoping Considerations English.vtt |
16.43KB |
14 |
45.93KB |
14 - Ethical Mindset.mp4 |
23.21MB |
14 - Ethical Mindset English.vtt |
6.86KB |
15 |
283.40KB |
15 - Lab Environment Setup.mp4 |
225.12MB |
15 - Lab Environment Setup English.vtt |
20.14KB |
16 |
232.80KB |
16 - Project Strategy and Risk.mp4 |
121.39MB |
16 - Project Strategy and Risk English.vtt |
11.59KB |
17 |
89.33KB |
17 - Scope Vulnerabilities.mp4 |
226.42MB |
17 - Scope Vulnerabilities English.vtt |
16.37KB |
18 |
13.54KB |
18 - Compliance.mp4 |
47.99MB |
18 - Compliance English.vtt |
4.69KB |
19 |
11.08KB |
19 - Chapter02InformationGatheringHandout.pdf |
1.04MB |
19 - Scanning and Enumeration.mp4 |
43.90MB |
19 - Scanning and Enumeration English.vtt |
5.05KB |
1 - Chapter 1 Quiz.html |
0B |
1 - CompTIA PenTest Practice Test.html |
86B |
1 - Introduction to the CompTIA PenTest PT0002 Course.mp4 |
188.94MB |
1 - Introduction to the CompTIA PenTest PT0 English.vtt |
11.54KB |
2 |
373B |
20 |
687.24KB |
20 - Scanning Demo.mp4 |
159.94MB |
20 - Scanning Demo English.vtt |
13.03KB |
21 |
444.02KB |
21 - Packet Investigation.mp4 |
146.18MB |
21 - Packet Investigation English.vtt |
9.98KB |
22 |
876.34KB |
22 - Packet Inspection Demo.mp4 |
94.03MB |
22 - Packet Inspection Demo English.vtt |
6.83KB |
23 |
629.86KB |
23 - Labtainers Setup.mp4 |
92.59MB |
23 - Labtainers Setup English.vtt |
15.28KB |
24 |
517.92KB |
24 - Labtainers Lab Wireshark.mp4 |
113.41MB |
24 - Labtainers Lab Wireshark English.vtt |
10.96KB |
25 |
42.99KB |
25 - Application and Open.mp4 |
219.55MB |
25 - Application and Open English.vtt |
13.77KB |
26 |
741.90KB |
26 - Passive Reconnaissance.mp4 |
110.61MB |
26 - Passive Reconnaissance English.vtt |
11.45KB |
27 |
628.29KB |
27 - Active Reconnaissance.mp4 |
54.90MB |
27 - Active Reconnaissance English.vtt |
8.68KB |
28 |
599.94KB |
28 - Vulnerability Scanning.mp4 |
77.52MB |
28 - Vulnerability Scanning English.vtt |
10.74KB |
29 |
567.45KB |
29 - Vulnerability Scanning Demo.mp4 |
138.33MB |
29 - Vulnerability Scanning Demo English.vtt |
19.23KB |
2 - About the CompTIA PenTest PT0002 Exam.mp4 |
86.92MB |
2 - About the CompTIA PenTest PT0 English.vtt |
9.22KB |
2 - Certified Ethical Hacker CEH Practice Test.html |
79B |
2 - Chapter 2 Quiz.html |
0B |
3 |
1.19KB |
30 |
401.41KB |
30 - Labtainers Lab Network Basics.mp4 |
20.85MB |
30 - Labtainers Lab Network Basics English.vtt |
3.07KB |
31 |
655.97KB |
31 - Labtainers Lab Nmap Discovery.mp4 |
22.58MB |
31 - Labtainers Lab Nmap Discovery English.vtt |
3.43KB |
32 |
981.46KB |
32 - Target Considerations.mp4 |
182.15MB |
32 - Target Considerations English.vtt |
19.54KB |
33 |
287.67KB |
33 - Analyzing Scan Output.mp4 |
35.41MB |
33 - Analyzing Scan Output English.vtt |
5.88KB |
34 |
801.37KB |
34 - Nmap Scoping and Output Options.mp4 |
338.57MB |
34 - Nmap Scoping and Output Options English.vtt |
26.15KB |
35 |
655.05KB |
35 - Nmap Timing and Performance Options.mp4 |
56.21MB |
35 - Nmap Timing and Performance Options English.vtt |
7.77KB |
36 |
51.35KB |
36 - Prioritization of Vulnerabilities.mp4 |
40.13MB |
36 - Prioritization of Vulnerabilities English.vtt |
9.44KB |
37 |
922.39KB |
37 - Common Attack Techniques.mp4 |
137.57MB |
37 - Common Attack Techniques English.vtt |
14.60KB |
38 |
989.93KB |
38 - Automating Vulnerability Scans.mp4 |
32.83MB |
38 - Automating Vulnerability Scans English.vtt |
4.04KB |
39 |
155.75KB |
39 - Credential Attacks.mp4 |
141.28MB |
39 - Credential Attacks English.vtt |
16.85KB |
3 - Chapter01PlanningandEngagementHandout.pdf |
792.14KB |
3 - Chapter 3 Quiz.html |
0B |
3 - Planning a Pen Test.mp4 |
178.13MB |
3 - Planning a Pen Test English.vtt |
10.68KB |
4 |
580.15KB |
40 |
415.00KB |
40 - Labtainers Lab Password Cracking.mp4 |
18.75MB |
40 - Labtainers Lab Password Cracking English.vtt |
2.82KB |
41 |
637.31KB |
41 - Labtainers Lab Secure Socket Layers.mp4 |
16.82MB |
41 - Labtainers Lab Secure Socket Layers English.vtt |
2.90KB |
42 |
116.06KB |
42 - Labtainers Lab Routing Basics.mp4 |
15.09MB |
42 - Labtainers Lab Routing Basics English.vtt |
2.11KB |
43 |
167.73KB |
43 - Chapter03NetworkAttacksHandout.pdf |
779.83KB |
43 - Exploit Resources and Network Attacks.mp4 |
77.32MB |
43 - Exploit Resources and Network Attacks English.vtt |
5.26KB |
44 |
426.03KB |
44 - Network.mp4 |
82.43MB |
44 - Network English.vtt |
7.86KB |
45 |
312.22KB |
45 - FTP Exploit Demo.mp4 |
79.10MB |
45 - FTP Exploit Demo English.vtt |
9.19KB |
46 |
930.26KB |
46 - Man.mp4 |
68.53MB |
46 - Man English.vtt |
8.03KB |
47 |
930.89KB |
47 - Labtainers Lab TCPIP Attacks.mp4 |
26.52MB |
47 - Labtainers Lab TCPIP Attacks English.vtt |
2.49KB |
48 |
84.61KB |
48 - Labtainers Lab ARP Spoof Attacks.mp4 |
14.71MB |
48 - Labtainers Lab ARP Spoof Attacks English.vtt |
2.35KB |
49 |
1001.03KB |
49 - Labtainers Lab Local DNS Attacks.mp4 |
16.07MB |
49 - Labtainers Lab Local DNS Attacks English.vtt |
2.07KB |
4 - Chapter 4 Quiz.html |
0B |
4 - Rules of Engagement.mp4 |
231.32MB |
4 - Rules of Engagement English.vtt |
13.24KB |
5 |
6.82KB |
50 |
402.19KB |
50 - Labtainers Lab MACs and Hash Functions.mp4 |
17.57MB |
50 - Labtainers Lab MACs and Hash Functions English.vtt |
1.74KB |
51 |
584.44KB |
51 - Chapter04WirelessandRFAttacksHandout.pdf |
734.49KB |
51 - Wireless Exploits.mp4 |
156.00MB |
51 - Wireless Exploits English.vtt |
15.72KB |
52 |
710.87KB |
52 - Wireless Exploits Part 2.mp4 |
16.26MB |
52 - Wireless Exploits Part 2 English.vtt |
3.19KB |
53 |
628.06KB |
53 - Antennas.mp4 |
47.66MB |
53 - Antennas English.vtt |
4.45KB |
54 |
924.97KB |
54 - Chapter05WebandDatabaseAttacksHandout.pdf |
891.24KB |
54 - OWASP Top 10.mp4 |
81.31MB |
54 - OWASP Top 10 English.vtt |
10.24KB |
55 |
495.66KB |
55 - Application Exploits Part 1.mp4 |
64.48MB |
55 - Application Exploits Part 1 English.vtt |
6.11KB |
56 |
693.06KB |
56 - SQL Injection Demo.mp4 |
97.10MB |
56 - SQL Injection Demo English.vtt |
10.15KB |
57 |
99.92KB |
57 - Labtainers Lab SQL Injection.mp4 |
22.28MB |
57 - Labtainers Lab SQL Injection English.vtt |
3.20KB |
58 |
527.57KB |
58 - Application Exploits Part 2.mp4 |
93.85MB |
58 - Application Exploits Part 2 English.vtt |
9.72KB |
59 |
53.07KB |
59 - Application Exploits Part 3.mp4 |
105.72MB |
59 - Application Exploits Part 3 English.vtt |
10.46KB |
5 - Chapter 5 Quiz.html |
0B |
5 - Regulatory Compliance.mp4 |
46.11MB |
5 - Regulatory Compliance English.vtt |
4.61KB |
6 |
457.61KB |
60 |
478.05KB |
60 - Cross.mp4 |
42.93MB |
60 - Cross English.vtt |
8.30KB |
61 |
580.03KB |
61 - Labtainers Lab Cross English.vtt |
1.92KB |
61 - Labtainers Lab CrossSite Scripting.mp4 |
18.48MB |
62 |
477.54KB |
62 - Labtainers Lab Cross.mp4 |
9.97MB |
62 - Labtainers Lab Cross English.vtt |
1.45KB |
63 |
713.21KB |
63 - Code Vulnerabilities.mp4 |
195.40MB |
63 - Code Vulnerabilities English.vtt |
20.89KB |
64 |
837.61KB |
64 - API Attacks and Attack Resources.mp4 |
51.66MB |
64 - API Attacks and Attack Resources English.vtt |
7.08KB |
65 |
399.36KB |
65 - Privilege Escalation Linux.mp4 |
112.45MB |
65 - Privilege Escalation Linux English.vtt |
11.45KB |
66 |
533.99KB |
66 - Privilege Escalation Windows.mp4 |
70.48MB |
66 - Privilege Escalation Windows English.vtt |
7.00KB |
67 |
307.43KB |
67 - Misc Privilege Escalation.mp4 |
128.49MB |
67 - Misc Privilege Escalation English.vtt |
8.99KB |
68 |
334.77KB |
68 - Misc Local Host Vulnerabilities.mp4 |
89.58MB |
68 - Misc Local Host Vulnerabilities English.vtt |
9.63KB |
69 |
34.16KB |
69 - Chapter06AttackingtheCloudHandout.pdf |
729.77KB |
69 - Cloud Attacks Part 1.mp4 |
33.84MB |
69 - Cloud Attacks Part 1 English.vtt |
5.59KB |
6 - Chapter 6 Quiz.html |
0B |
6 - Resources and Budget.mp4 |
82.61MB |
6 - Resources and Budget English.vtt |
9.04KB |
7 |
58.96KB |
70 |
703.63KB |
70 - Cloud Attacks Part 2.mp4 |
69.53MB |
70 - Cloud Attacks Part 2 English.vtt |
5.47KB |
71 |
809.28KB |
71 - Chapter07SpecializedandFragileSystemsHandout.pdf |
791.83KB |
71 - Mobile Attacks.mp4 |
152.72MB |
71 - Mobile Attacks English.vtt |
11.80KB |
72 |
102.44KB |
72 - IoT Attacks.mp4 |
47.90MB |
72 - IoT Attacks English.vtt |
11.77KB |
73 |
344.84KB |
73 - Data Storage and Management Interface Attacks.mp4 |
87.09MB |
73 - Data Storage and Management Interface Attacks English.vtt |
9.97KB |
74 |
656.83KB |
74 - Virtual and Containerized Environment Attacks.mp4 |
135.14MB |
74 - Virtual and Containerized Environment Attacks English.vtt |
8.08KB |
75 |
7.74KB |
75 - Labtainers Lab Industrial Control System.mp4 |
14.64MB |
75 - Labtainers Lab Industrial Control System English.vtt |
2.04KB |
76 |
99.57KB |
76 - Chapter08SocialEngineeringandPhysicalAttacksHandout.pdf |
748.50KB |
76 - Pretext for a Social Engineering Attack.mp4 |
23.83MB |
76 - Pretext for a Social Engineering Attack English.vtt |
2.73KB |
77 |
347.94KB |
77 - PenTestChapter3SelectingYourAttackspptx |
385.33KB |
77 - Remote Social Engineering.mp4 |
69.95MB |
77 - Remote Social Engineering English.vtt |
7.09KB |
78 |
837.19KB |
78 - Spear Phishing Demo.mp4 |
98.36MB |
78 - Spear Phishing Demo English.vtt |
11.88KB |
79 |
906.64KB |
79 - In.mp4 |
235.78MB |
79 - In English.vtt |
13.94KB |
7 - Chapter 7 Quiz.html |
0B |
7 - Impact and Constraints.mp4 |
58.97MB |
7 - Impact and Constraints English.vtt |
6.35KB |
8 |
618.96KB |
80 |
103.93KB |
80 - Physical Security.mp4 |
130.38MB |
80 - Physical Security English.vtt |
14.67KB |
81 |
74.06KB |
81 - Chapter09PostExploitationHandout.pdf |
771.35KB |
81 - Post.mp4 |
123.96MB |
81 - Post English.vtt |
12.99KB |
82 |
266.06KB |
82 - Post.mp4 |
28.98MB |
82 - Post English.vtt |
4.06KB |
83 |
891.98KB |
83 - Network Segmentation Testing.mp4 |
25.52MB |
83 - Network Segmentation Testing English.vtt |
2.87KB |
84 |
137.51KB |
84 - Persistence and Stealth.mp4 |
122.28MB |
84 - Persistence and Stealth English.vtt |
13.44KB |
85 |
872.57KB |
85 - Detection Avoidance Techniques.mp4 |
109.36MB |
85 - Detection Avoidance Techniques English.vtt |
6.93KB |
86 |
605.27KB |
86 - Chapter10PostEngagementActivitiesHandout.pdf |
897.72KB |
86 - Report Writing.mp4 |
237.03MB |
86 - Report Writing English.vtt |
19.09KB |
87 |
66.38KB |
87 - Important Components of Written Reports.mp4 |
18.23MB |
87 - Important Components of Written Reports English.vtt |
3.06KB |
88 |
162.18KB |
88 - Mitigation Strategies.mp4 |
58.31MB |
88 - Mitigation Strategies English.vtt |
6.41KB |
89 |
169.06KB |
89 - Technical and Physical Controls.mp4 |
22.13MB |
89 - Technical and Physical Controls English.vtt |
4.61KB |
8 - Chapter 8 Quiz.html |
0B |
8 - Support Resources.mp4 |
153.19MB |
8 - Support Resources English.vtt |
16.35KB |
9 |
64.90KB |
90 |
854.48KB |
90 - Administrative and Operational Controls.mp4 |
34.94MB |
90 - Administrative and Operational Controls English.vtt |
6.06KB |
91 |
712.02KB |
91 - Communication.mp4 |
101.22MB |
91 - Communication English.vtt |
11.23KB |
92 |
16.07KB |
92 - Presentation of Findings.mp4 |
26.08MB |
92 - Presentation of Findings English.vtt |
3.49KB |
93 |
486.90KB |
93 - Post.mp4 |
62.70MB |
93 - Post English.vtt |
6.76KB |
94 |
941.28KB |
94 - Data Destruction Process.mp4 |
13.17MB |
94 - Data Destruction Process English.vtt |
1.72KB |
95 |
494.99KB |
95 - Chapter11ToolsandProgrammingHandout.pdf |
1.29MB |
95 - Using Scripting in Pen Testing.mp4 |
142.27MB |
95 - Using Scripting in Pen Testing English.vtt |
16.60KB |
96 |
348.34KB |
96 - Bash Scripting Basics.mp4 |
149.02MB |
96 - Bash Scripting Basics English.vtt |
19.34KB |
97 |
169.07KB |
97 - Bash Scripting Techniques.mp4 |
89.84MB |
97 - Bash Scripting Techniques English.vtt |
13.39KB |
98 |
695.95KB |
98 - PowerShell Scripts.mp4 |
31.30MB |
98 - PowerShell Scripts English.vtt |
4.72KB |
99 |
812.60KB |
99 - Ruby Scripts.mp4 |
46.18MB |
99 - Ruby Scripts English.vtt |
8.07KB |
9 - Chapter 9 Quiz.html |
0B |
9 - Legal Groundwork.mp4 |
196.07MB |
9 - Legal Groundwork English.vtt |
13.67KB |
TutsNode.com.txt |
63B |