Curriculum For This Course
Video tutorials list
-
Introduction
Video Name Time 1. Exam Foundations 5:00 -
Domain 1: Planning and Scoping
Video Name Time 1. Planning and Scoping (Overview) 1:00 2. Penetration Testing Methodology 3:00 3. Planning a Penetration Test 8:00 4. Rules of Engagement 6:00 5. Legal Concepts 11:00 6. Testing Strategies 3:00 7. White Box Support Resources 7:00 8. Types of Assessments 6:00 9. Threat Actors 8:00 10. Target Selection 5:00 -
Domain 2: Information Gathering and Vulnerability Identification
Video Name Time 1. Information Gathering and Vulnerability Identification (Overview) 3:00 2. Information Gathering 10:00 3. Reconnaissance with CentralOps (Demo) 13:00 4. Scanning and Enumeration 5:00 5. Fingerprinting 4:00 6. Scanning and Enumeration (Demo) 16:00 7. Cryptographic Inspection 2:00 8. Eavesdropping 3:00 9. Decompiling and Debugging 3:00 10. Open Source Research 6:00 11. Vulnerability Scanning 9:00 12. Scanning Considerations 6:00 13. Application and Container Scans 3:00 14. Analyzing Vulnerability Scans 7:00 15. Leverage Information for Exploit 3:00 16. Common Attack Vectors 6:00 17. Weaknesses in Specialized Systems 11:00 -
Domain 3: Attacks and Exploits
Video Name Time 1. Attacks and Exploits (Overview) 2:00 2. Social Engineering 12:00 3. Motivation Factors 7:00 4. Physical Security Attacks 6:00 5. Lock Picking (Demo) 1:00 6. Network-based Vulnerabilities 14:00 7. Wireless-based Vulnerabilities 9:00 8. Wireless Network Attack (Demo) 6:00 9. Application-based Vulnerabilities 19:00 10. Local Host Vulnerabilities 3:00 11. Privilege Escalation (Linux) 5:00 12. Privilege Escalation (Windows) 11:00 13. Privilege Escalation 5:00 14. Privilege Escalation (Demo) 5:00 15. Lateral Movement 9:00 16. Persistence 7:00 17. Covering Your Tracks 6:00 18. Persistence and Covering Tracks (Demo) 8:00 -
Domain 4: Penetration Testing Tools
Video Name Time 1. Penetration Testing Tools (Overview) 3:00 2. Nmap Usage 10:00 3. Nmap Usage (Demo) 12:00 4. Use Cases for Tools 7:00 5. Scanners 2:00 6. Credential Testing Tools 7:00 7. Password Cracking (Demo) 2:00 8. Debuggers 3:00 9. Software Assurance 2:00 10. OSINT 5:00 11. Wireless 2:00 12. Web Proxies 9:00 13. Social Engineering Tools 1:00 14. Remote Access Tools 7:00 15. Networking Tools 2:00 16. Mobile Tools 2:00 17. Miscellaneous Tools 4:00 18. Intro to Programming 3:00 19. Programming Concepts 22:00 20. BASH Script Example 5:00 21. Python Script Example 4:00 22. PowerShell Script Example 3:00 23. Ruby Script Example 4:00 -
Domain 5: Reporting and Communication
Video Name Time 1. Reporting and Communication (Overview) 2:00 2. Pentest Communications 9:00 3. Report Writing 8:00 4. Mitigation Strategies 7:00 5. Post-Report Activities 4:00 6. Pentest Report Example 1:00
Add Comment