|
Video Name |
Time |
|
1. Planning an Engagement (OBJ 1.1, 1.2, and 1.3) |
2:26 |
|
2. Risk (OBJ 1.2) |
9:11 |
|
3. Risk Handling (OBJ 1.2) |
7:52 |
|
4. Controls (OBJ 1.2) |
7:30 |
|
5. PenTest Methodologies (OBJ 1.2) |
7:55 |
|
6. PenTest Standards (OBJ 1.2) |
7:06 |
|
7. Planning a Test (OBJ 1.2) |
9:39 |
|
8. Legal Concepts (OBJ 1.1) |
8:20 |
|
9. Regulatory Compliance (OBJ 1.1) |
15:16 |
|
10. Professionalism (OBJ 1.3) |
10:31 |
|
Video Name |
Time |
|
1. Scoping an Engagement (OBJ 1.1, 1.2, and 1.3) |
3:35 |
|
2. Defining the Scope (OBJ 1.2) |
6:57 |
|
3. Adversary Emulation (OBJ 1.2) |
11:54 |
|
4. Target List (OBJ 1.2) |
10:56 |
|
5. Identifying Restrictions (OBJ 1.1) |
8:01 |
|
6. Rules of Engagement (OBJ 1.2) |
7:45 |
|
7. Assessment Types (OBJ 1.3) |
8:59 |
|
8. Validating the Scope (OBJ 1.2) |
5:17 |
|
9. Limitations and Permission (OBJ 1.1 and 1.3) |
6:57 |
|
10. Build a Virtual Lab |
16:39 |
|
Video Name |
Time |
|
1. Passive Reconnaissance (OBJ 2.1) |
2:39 |
|
2. Information Gathering (OBJ 2.1) |
5:57 |
|
3. Open-Source Intelligence (OSINT) (OBJ 2.1) |
5:36 |
|
4. Social Media Scraping (OBJ 2.1) |
2:29 |
|
5. OSINT Tools (OBJ 2.1) |
11:43 |
|
6. Using OSINT Tools (OBJ 2.1) |
26:35 |
|
7. DNS Information (OBJ 2.1) |
9:04 |
|
8. Reconnaissance with CentralOps (OBJ 2.1) |
13:05 |
|
9. Public Repositories (OBJ2.1) |
4:40 |
|
10. Search Engine Analysis (OBJ 2.1) |
6:21 |
|
11. URL Analysis (OBJ 2.1) |
15:20 |
|
12. Cryptographic Flaws (OBJ 2.1) |
16:31 |
|
13. CWE & CVE (OBJ 2.1) |
6:24 |
|
Video Name |
Time |
|
1. Active Reconnaissance (OBJ 2.2 and 2.3) |
2:19 |
|
2. Scanning and Enumeration (OBJ 2.2 and 2.3) |
10:07 |
|
3. Conducting Enumeration (OBJ 2.3) |
14:57 |
|
4. Other Enumeration (OBJ 2.2 and 2.3) |
9:24 |
|
5. Website Reconnaissance (OBJ 2.3) |
8:45 |
|
6. Detecting and Evading Defenses (OBJ 2.2) |
9:47 |
|
7. Packet Crafting (OBJ 2.2) |
10:29 |
|
8. Eavesdropping (OBJ 2.2) |
10:15 |
|
9. Wardriving (OBJ 2.2) |
8:17 |
|
10. DNS and ARP Analysis (OBJ 2.3) |
23:00 |
|
11. Network Traffic Analysis (OBJ 2.3) |
17:53 |
|
Video Name |
Time |
|
1. Social Engineering and Physical Attacks (OBJ 3.6) |
3:36 |
|
2. Methods of Influence (OBJ 3.6) |
11:11 |
|
3. Social Engineering (OBJ 3.6) |
14:00 |
|
4. Phishing Campaigns (OBJ 3.6) |
5:14 |
|
5. Social Engineering Toolkit (OBJ 3.6) |
13:38 |
|
6. Pretexting (OBJ 3.6) |
4:08 |
|
7. Baiting Victims (OBJ 3.6) |
5:49 |
|
8. Impersonation (OBJ 3.6) |
4:17 |
|
9. Physical Security (OBJ 3.6) |
15:43 |
|
10. Lock Picking (OBJ 3.6) |
1:37 |
|
11. Physical Attacks (OBJ 3.6) |
10:25 |
|
12. Social Engineering Tools (OBJ 3.6) |
4:15 |
|
Video Name |
Time |
|
1. Wireless Attacks (OBJ 3.2) |
3:24 |
|
2. Wireless Security (OBJ 3.2) |
16:38 |
|
3. Bypassing MAC Filtering (OBJ 3.2) |
4:08 |
|
4. Signal Exploitation (OBJ 3.2) |
11:16 |
|
5. WEP Hacking (OBJ 3.2) |
9:22 |
|
6. WPA/WPA2 Hacking (OBJ 3.2) |
8:37 |
|
7. WPS PIN Attacks (OBJ 3.2) |
11:45 |
|
8. Evil Twins (OBJ 3.2) |
5:53 |
|
9. On-path and Relay Attacks (OBJ 3.2) |
4:47 |
|
10. Bluetooth Attacks (OBJ 3.2) |
5:50 |
|
11. RFID and NFC Attacks (OBJ 3.2) |
4:46 |
|
Video Name |
Time |
|
1. Network Attacks (OBJ 3.1) |
2:30 |
|
2. Stress Testing (OBJ 3.1) |
6:33 |
|
3. Exploit Resources (OBJ 3.1) |
6:23 |
|
4. ARP Poisoning (OBJ 3.1) |
7:17 |
|
5. DNS Cache Poisoning (OBJ 3.1) |
12:37 |
|
6. LLMNR/NBT-NS Poisoning (OBJ 3.1) |
4:50 |
|
7. MAC Spoofing (OBJ 3.1) |
5:23 |
|
8. VLAN Hopping (OBJ 3.1) |
6:56 |
|
9. NAC Bypass (OBJ 3.1) |
4:51 |
|
10. On-path Attack (OBJ 3.1) |
3:58 |
|
11. Password Attacks (OBJ 3.1) |
10:09 |
|
12. Pass the Hash (OBJ 3.1) |
7:55 |
|
13. Intro to Metasploit (OBJ 3.1) |
18:53 |
|
14. Netcat (OBJ 3.1) |
7:41 |
|
15. Using Netcat (OBJ 3.1) |
10:59 |
|
Video Name |
Time |
|
1. Application Vulnerabilities (OBJ 3.3) |
5:43 |
|
2. Race Conditions (OBJ 3.3) |
4:55 |
|
3. Buffer Overflows (OBJ 3.3) |
12:23 |
|
4. Buffer Overflow Attacks (OBJ 3.3) |
6:25 |
|
5. Authentication and References (OBJ 3.3) |
4:44 |
|
6. Improper Error Handling (OBJ 3.3) |
5:11 |
|
7. Improper Headers (OBJ 3.3) |
6:06 |
|
8. Code Signing (OBJ 3.3) |
1:56 |
|
9. Vulnerable Components (OBJ 3.3) |
11:42 |
|
10. Software Composition (OBJ 3.3) |
9:46 |
|
11. Privilege Escalation (OBJ 3.3) |
6:09 |
|
12. Conducting Privilege Escalation (OBJ 3.3) |
13:06 |
|
Video Name |
Time |
|
1. Application Attacks (OBJ 3.3) |
2:36 |
|
2. Directory Traversals (OBJ 3.3) |
9:32 |
|
3. Dirbuster (OBJ 3.3) |
7:15 |
|
4. Cross-Site Scripting (XSS) (OBJ 3.3) |
8:56 |
|
5. Cross-Site Request Forgery (CSRF) (OBJ 3.3) |
7:10 |
|
6. SQL Injections (OBJ 3.3) |
6:58 |
|
7. Conducting SQL Injections (OBJ 3.3) |
8:26 |
|
8. Burp Suite and SQLmap (OBJ 3.3) |
10:06 |
|
9. OWASP ZAP (OBJ 3.3) |
2:49 |
|
10. XML Injections (OBJ 3.3) |
6:20 |
|
11. Other Injection Attacks (OBJ 3.3) |
3:21 |
|
12. Attacking Web Applications (OBJ 3.3) |
15:36 |
|
Video Name |
Time |
|
1. Attacks on Mobile Devices (OBJ 3.5) |
4:46 |
|
2. Enterprise Mobility Management (OBJ 3.5) |
9:32 |
|
3. Deployment Options (OBJ 3.5) |
4:34 |
|
4. Mobile Reconnaissance Concerns (OBJ 3.5) |
7:57 |
|
5. Mobile Device Insecurity (OBJ 3.5) |
12:15 |
|
6. Multifactor Authentication (OBJ 3.5) |
12:11 |
|
7. Mobile Device Attacks (OBJ 3.5) |
5:14 |
|
8. Malware Analysis (OBJ 3.5) |
13:13 |
|
9. Conducting Malware Analysis (OBJ 3.5) |
25:55 |
|
10. Mobile Device Tools (OBJ 3.5) |
8:21 |
|
Video Name |
Time |
|
1. Attacks on Specialized Systems (OBJ 3.5) |
2:44 |
|
2. Internet of Things (IoT) Devices (OBJ 3.5) |
8:17 |
|
3. Internet of Things (IoT) Vulnerabilities (OBJ 3.5) |
7:35 |
|
4. Embedded Systems (OBJ 3.5) |
6:45 |
|
5. ICS and SCADA Devices (OBJ 3.5) |
9:16 |
|
6. ICS Protocols and Vulnerabilities (OBJ 3.5) |
10:51 |
|
7. Data Storage Vulnerabilities (OBJ 3.5) |
5:58 |
|
8. Virtual Environments (OBJ 3.5) |
8:16 |
|
9. Virtual Machine Attacks (OBJ 3.5) |
5:56 |
|
10. Containerization (OBJ 3.5 |
5:45 |
|
Video Name |
Time |
|
1. Post-exploitation (OBJ 3.7) |
2:51 |
|
2. Enumerating the Network (OBJ 3.7) |
4:04 |
|
3. Network Segmentation Testing (OBJ 3.7) |
3:10 |
|
4. Lateral Movement and Pivoting (OBJ 3.7) |
2:58 |
|
5. Pass the Hash (OBJ 3.7) |
7:49 |
|
6. Golden Ticket (OBJ 3.7) |
6:05 |
|
7. Lateral Movement (OBJ 3.7) |
8:31 |
|
8. Pivoting (3.7) |
7:42 |
|
9. Escalating Privileges (OBJ 3.7) |
19:14 |
|
10. Upgrading Restrictive Shells (OBJ 3.7) |
5:26 |
|
Video Name |
Time |
|
1. Detection Avoidance (OBJ 3.7) |
1:31 |
|
2. Trojans and Backdoors (OBJ 3.7) |
4:20 |
|
3. Creating Persistence (OBJ 3.7) |
13:51 |
|
4. Living Off the Land (OBJ 3.7) |
12:01 |
|
5. Data Exfiltration (OBJ 3.7) |
6:46 |
|
6. Covert Channels (OBJ 3.7) |
4:44 |
|
7. Steganography (3.7) |
2:58 |
|
8. Covering Your Tracks (OBJ 3.7) |
10:03 |
|
9. Persistence and Covering Your Tracks (OBJ 3.7) |
8:44 |
|
10. Post-Exploitation Tools (OBJ 3.7) |
3:00 |
|
Video Name |
Time |
|
1. Communication and Reports (OBJ 4.3) |
1:44 |
|
2. Communication Paths (OBJ 4.3) |
5:25 |
|
3. Communication Triggers (OBJ 4.3) |
4:36 |
|
4. Reasons for Communication (OBJ 4.3) |
10:18 |
|
5. Presentation of Findings (4.1 & OBJ 4.3) |
6:05 |
|
6. Report Data Gathering (OBJ 4.1) |
3:38 |
|
7. Written Reports (OBJ 4.1) |
14:44 |
|
8. Common Themes (OBJ 4.1) |
3:01 |
|
9. Securing and Storing Reports (OBJ 4.1) |
5:06 |
|
Video Name |
Time |
|
1. Findings and Remediations (OBJ 4.2) |
2:32 |
|
2. Security Control Categories (OBJ 4.2) |
13:35 |
|
3. Selecting Security Controls (OBJ 4.2) |
3:56 |
|
4. Physical Controls (OBJ 4.2) |
6:55 |
|
5. Operational Controls (OBJ 4.2) |
10:22 |
|
6. Administrative Controls (OBJ 4.2) |
14:23 |
|
7. System Hardening (OBJ 4.2) |
10:55 |
|
8. Secure Coding (OBJ 4.2) |
8:19 |
|
9. Implementing MFA (OBJ 4.2) |
6:21 |
|
10. Digital Certificates (OBJ 4.2) |
9:47 |
|
11. Other Technical Controls (OBJ 4.2) |
2:41 |
|
12. Mitigation Strategies (OBJ 4.2) |
8:07 |
|
Video Name |
Time |
|
1. Analyzing Scripts (OBJ 5.2) |
5:18 |
|
2. Coding in Bash (OBJ 5.2) |
21:17 |
|
3. Bash Example (OBJ 5.2) |
4:35 |
|
4. Coding in PowerShell (OBJ 5.2) |
15:41 |
|
5. PowerShell Example (OBJ 5.2) |
3:25 |
|
6. Coding in Python (OBJ 5.2) |
19:52 |
|
7. Python Example (OBJ 5.2) |
3:40 |
|
8. Coding in Perl (OBJ 5.2) |
17:24 |
|
9. Perl Example (OBJ 5.2) |
16:11 |
|
10. Coding in JavaScript (OBJ 5.2) |
19:22 |
|
11. JavaScript Example (OBJ 5.2) |
9:48 |
|
12. Coding in Ruby (OBJ 5.2) |
13:43 |
|
13. Ruby Example (OBJ 5.2) |
4:15 |
|
Video Name |
Time |
|
1. Tool Round-up (OBJ 5.3) |
2:54 |
|
2. OSINT Tools (OBJ 5.3) |
6:14 |
|
3. Scanning Tools (OBJ 5.3) |
6:40 |
|
4. Networking Tools (OBJ 5.3) |
2:31 |
|
5. Wireless Tools (OBJ 5.3) |
7:37 |
|
6. Social Engineering Tools (OBJ 5.3) |
2:36 |
|
7. Remote Access Tools (OBJ 5.3) |
4:24 |
|
8. Credential Testing Tools (OBJ 5.3) |
7:39 |
|
9. Web Application Tools (OBJ 5.3) |
2:26 |
|
10. Cloud Tools (OBJ 5.3) |
2:59 |
|
11. Steganography Tools (OBJ 5.3) |
6:35 |
|
12. Debuggers (OBJ 5.3) |
5:32 |
|
13. Miscellaneous Tools (OBJ 5.3) |
9:27 |