Удален по просьбе правообладателя
  1. Урок 1.00:04:08
    Understanding Penetration Testing
  2. Урок 2.00:08:26
    Why Do Penetration Tests?
  3. Урок 3.00:04:01
    Types of Pen Tests
  4. Урок 4.00:16:04
    Stage 1: Pre-attack
  5. Урок 5.00:06:38
    Stage 2: Attack
  6. Урок 6.00:01:46
    Stage 3: Post-attack
  7. Урок 7.00:16:50
    Pen Testing Standards
  8. Урок 8.00:03:11
    Summary
  9. Урок 9.00:01:20
    Laying the Foundation
  10. Урок 10.00:06:19
    The Steps to a Successful Pen Test
  11. Урок 11.00:00:52
    Summary
  12. Урок 12.00:01:58
    Intro to Scanning the Target
  13. Урок 13.00:06:05
    Steps to Scan the Target
  14. Урок 14.00:00:51
    Summary
  15. Урок 15.00:01:47
    Intro to Enumerating the Target
  16. Урок 16.00:07:24
    Steps to Enumerate the Target
  17. Урок 17.00:05:12
    Summary
  18. Урок 18.00:03:18
    Intro to Hacking the Target
  19. Урок 19.00:10:06
    Password Cracking
  20. Урок 20.00:02:14
    Privilege Escalation
  21. Урок 21.00:02:09
    Service Accounts
  22. Урок 22.00:03:33
    Hide & Seek Time
  23. Урок 23.00:01:32
    Covering Our Tracks
  24. Урок 24.00:02:28
    Summary
  25. Урок 25.00:01:50
    Intro to Sniffing the Target
  26. Урок 26.00:05:31
    Flooding, Spoofing, & Poisoning
  27. Урок 27.00:01:57
    Summary
  28. Урок 28.00:04:33
    Intro to Social Engineering
  29. Урок 29.00:04:14
    Reconnaissance & Creating the Scenario
  30. Урок 30.00:06:16
    Attacking
  31. Урок 31.00:01:46
    Summary
  32. Урок 32.00:03:09
    Intro to DoS/DDoS the Target
  33. Урок 33.00:00:56
    Outline Objectives
  34. Урок 34.00:02:17
    Load up the Server
  35. Урок 35.00:01:34
    Look for Vulnerabilities & Flooding
  36. Урок 36.00:01:50
    Email-bombing & Flood Web-forms
  37. Урок 37.00:02:42
    Summary
  38. Урок 38.00:02:54
    Intro to Session Hijacking the Target
  39. Урок 39.00:05:31
    Steps to Test for Session Hijacking
  40. Урок 40.00:01:42
    Summary
  41. Урок 41.00:03:26
    Intro to Targeting Web Servers
  42. Урок 42.00:04:12
    Recon Your Targets
  43. Урок 43.00:03:56
    More In-depth Recon
  44. Урок 44.00:01:51
    Summary
  45. Урок 45.00:03:33
    Intro to Hitting the Web Apps
  46. Урок 46.00:03:36
    Define Targets & Gather Information
  47. Урок 47.00:02:11
    Configuration Management Testing
  48. Урок 48.00:02:18
    Authentication Testing
  49. Урок 49.00:01:49
    Session Management Testing
  50. Урок 50.00:01:10
    Authorization Testing
  51. Урок 51.00:03:47
    Data Validation Testing
  52. Урок 52.00:02:24
    Denial of Service Testing
  53. Урок 53.00:03:32
    Web Services Testing
  54. Урок 54.00:02:19
    AJAX Testing
  55. Урок 55.00:03:21
    Summary
  56. Урок 56.00:02:31
    Intro to Looking at the Wi-Fi
  57. Урок 57.00:01:26
    Who's Out There!?
  58. Урок 58.00:01:07
    WEP Testing
  59. Урок 59.00:02:09
    WPA/WPA2 Testing
  60. Урок 60.00:02:08
    General Wi-Fi Testing
  61. Урок 61.00:01:54
    Summary
  62. Урок 62.00:03:16
    Intro to Focusing on the Mobile Devices
  63. Урок 63.00:04:25
    Android Pen Testing
  64. Урок 64.00:03:26
    iPhone Pen Testing
  65. Урок 65.00:02:41
    Windows Phone Pen Testing
  66. Урок 66.00:04:16
    BlackBerry Pen Testing
  67. Урок 67.00:01:56
    Summary
  68. Урок 68.00:02:34
    Intro to Target the Firewall and/or IDS
  69. Урок 69.00:04:03
    Firewall Testing
  70. Урок 70.00:08:49
    IDS Testing
  71. Урок 71.00:01:20
    Summary
  72. Урок 72.00:02:10
    Intro to Going After the Cloud
  73. Урок 73.00:03:30
    It's Not All About You: Before You Begin
  74. Урок 74.00:06:36
    It's Not All About You: The Steps
  75. Урок 75.00:01:29
    Summary
  76. Урок 76.00:01:52
    Intro to How to Bring It All Together
  77. Урок 77.00:08:02
    What's in the Report?
  78. Урок 78.00:02:00
    Summary