Curriculum For This Course
Video tutorials list
-
Planning an Engagement
Video Name Time 1. Planning an Engagement (OBJ 1.1, 1.2, and 1.3) 2:26 2. Risk (OBJ 1.2) 9:11 3. Risk Handling (OBJ 1.2) 7:52 4. Controls (OBJ 1.2) 7:30 5. PenTest Methodologies (OBJ 1.2) 7:55 6. PenTest Standards (OBJ 1.2) 7:06 7. Planning a Test (OBJ 1.2) 9:39 8. Legal Concepts (OBJ 1.1) 8:20 9. Regulatory Compliance (OBJ 1.1) 15:16 10. Professionalism (OBJ 1.3) 10:31 -
Scoping an Engagement (PT0-002)
Video Name Time 1. Scoping an Engagement (OBJ 1.1, 1.2, and 1.3) 3:35 2. Defining the Scope (OBJ 1.2) 6:57 3. Adversary Emulation (OBJ 1.2) 11:54 4. Target List (OBJ 1.2) 10:56 5. Identifying Restrictions (OBJ 1.1) 8:01 6. Rules of Engagement (OBJ 1.2) 7:45 7. Assessment Types (OBJ 1.3) 8:59 8. Validating the Scope (OBJ 1.2) 5:17 9. Limitations and Permission (OBJ 1.1 and 1.3) 6:57 10. Build a Virtual Lab 16:39 -
Passive Reconnaissance (PT0-002)
Video Name Time 1. Passive Reconnaissance (OBJ 2.1) 2:39 2. Information Gathering (OBJ 2.1) 5:57 3. Open-Source Intelligence (OSINT) (OBJ 2.1) 5:36 4. Social Media Scraping (OBJ 2.1) 2:29 5. OSINT Tools (OBJ 2.1) 11:43 6. Using OSINT Tools (OBJ 2.1) 26:35 7. DNS Information (OBJ 2.1) 9:04 8. Reconnaissance with CentralOps (OBJ 2.1) 13:05 9. Public Repositories (OBJ2.1) 4:40 10. Search Engine Analysis (OBJ 2.1) 6:21 11. URL Analysis (OBJ 2.1) 15:20 12. Cryptographic Flaws (OBJ 2.1) 16:31 13. CWE & CVE (OBJ 2.1) 6:24 -
Active Reconnaissance
Video Name Time 1. Active Reconnaissance (OBJ 2.2 and 2.3) 2:19 2. Scanning and Enumeration (OBJ 2.2 and 2.3) 10:07 3. Conducting Enumeration (OBJ 2.3) 14:57 4. Other Enumeration (OBJ 2.2 and 2.3) 9:24 5. Website Reconnaissance (OBJ 2.3) 8:45 6. Detecting and Evading Defenses (OBJ 2.2) 9:47 7. Packet Crafting (OBJ 2.2) 10:29 8. Eavesdropping (OBJ 2.2) 10:15 9. Wardriving (OBJ 2.2) 8:17 10. DNS and ARP Analysis (OBJ 2.3) 23:00 11. Network Traffic Analysis (OBJ 2.3) 17:53 -
Vulnerability and Scanning (PT0-002)
Video Name Time 1. Vulnerability Scanning (OBJ 2.3 and 2.4) 1:57 2. Vulnerability Lifecycle (OBJ 2.3 and 2.4) 8:36 3. Vulnerability Scans (OBJ 2.3 and 2.4) 11:10 4. Scanning Considerations (OBJ 2.3 and 2.4) 9:22 5. Nessus Scanning (OBJ 2.3 and 2.4) 9:09 6. OpenVas Scanning (OBJ 2.3 and 2.4) 13:35 7. Nikto Scanning (OBJ 2.3 and 2.4) 5:19 -
Nmap (PT0-002)
Video Name Time 1. Nmap (OBJ 2.3 and 2.4) 2:31 2. Nmap Discovery Scans (OBJ 2.3 and 2.4) 7:54 3. Nmap Port Scans (OBJ 2.3 and 2.4) 9:13 4. Nmap Fingerprinting (OBJ 2.3 and 2.4) 4:13 5. Using Nmap (OBJ 2.3 and 2.4) 11:32 6. Nmap Scripting Engine (OBJ 2.3 and 2.4) 20:21 -
Social Engineering and Physical Attacks (PT0-002)
Video Name Time 1. Social Engineering and Physical Attacks (OBJ 3.6) 3:36 2. Methods of Influence (OBJ 3.6) 11:11 3. Social Engineering (OBJ 3.6) 14:00 4. Phishing Campaigns (OBJ 3.6) 5:14 5. Social Engineering Toolkit (OBJ 3.6) 13:38 6. Pretexting (OBJ 3.6) 4:08 7. Baiting Victims (OBJ 3.6) 5:49 8. Impersonation (OBJ 3.6) 4:17 9. Physical Security (OBJ 3.6) 15:43 10. Lock Picking (OBJ 3.6) 1:37 11. Physical Attacks (OBJ 3.6) 10:25 12. Social Engineering Tools (OBJ 3.6) 4:15 -
Wireless Attacks (PT0-002)
Video Name Time 1. Wireless Attacks (OBJ 3.2) 3:24 2. Wireless Security (OBJ 3.2) 16:38 3. Bypassing MAC Filtering (OBJ 3.2) 4:08 4. Signal Exploitation (OBJ 3.2) 11:16 5. WEP Hacking (OBJ 3.2) 9:22 6. WPA/WPA2 Hacking (OBJ 3.2) 8:37 7. WPS PIN Attacks (OBJ 3.2) 11:45 8. Evil Twins (OBJ 3.2) 5:53 9. On-path and Relay Attacks (OBJ 3.2) 4:47 10. Bluetooth Attacks (OBJ 3.2) 5:50 11. RFID and NFC Attacks (OBJ 3.2) 4:46 -
Network Attaks (PT0-002)
Video Name Time 1. Network Attacks (OBJ 3.1) 2:30 2. Stress Testing (OBJ 3.1) 6:33 3. Exploit Resources (OBJ 3.1) 6:23 4. ARP Poisoning (OBJ 3.1) 7:17 5. DNS Cache Poisoning (OBJ 3.1) 12:37 6. LLMNR/NBT-NS Poisoning (OBJ 3.1) 4:50 7. MAC Spoofing (OBJ 3.1) 5:23 8. VLAN Hopping (OBJ 3.1) 6:56 9. NAC Bypass (OBJ 3.1) 4:51 10. On-path Attack (OBJ 3.1) 3:58 11. Password Attacks (OBJ 3.1) 10:09 12. Pass the Hash (OBJ 3.1) 7:55 13. Intro to Metasploit (OBJ 3.1) 18:53 14. Netcat (OBJ 3.1) 7:41 15. Using Netcat (OBJ 3.1) 10:59 -
Application Vulnerabilities (PT0-002)
Video Name Time 1. Application Vulnerabilities (OBJ 3.3) 5:43 2. Race Conditions (OBJ 3.3) 4:55 3. Buffer Overflows (OBJ 3.3) 12:23 4. Buffer Overflow Attacks (OBJ 3.3) 6:25 5. Authentication and References (OBJ 3.3) 4:44 6. Improper Error Handling (OBJ 3.3) 5:11 7. Improper Headers (OBJ 3.3) 6:06 8. Code Signing (OBJ 3.3) 1:56 9. Vulnerable Components (OBJ 3.3) 11:42 10. Software Composition (OBJ 3.3) 9:46 11. Privilege Escalation (OBJ 3.3) 6:09 12. Conducting Privilege Escalation (OBJ 3.3) 13:06 -
Application Attacks (PT0-002)
Video Name Time 1. Application Attacks (OBJ 3.3) 2:36 2. Directory Traversals (OBJ 3.3) 9:32 3. Dirbuster (OBJ 3.3) 7:15 4. Cross-Site Scripting (XSS) (OBJ 3.3) 8:56 5. Cross-Site Request Forgery (CSRF) (OBJ 3.3) 7:10 6. SQL Injections (OBJ 3.3) 6:58 7. Conducting SQL Injections (OBJ 3.3) 8:26 8. Burp Suite and SQLmap (OBJ 3.3) 10:06 9. OWASP ZAP (OBJ 3.3) 2:49 10. XML Injections (OBJ 3.3) 6:20 11. Other Injection Attacks (OBJ 3.3) 3:21 12. Attacking Web Applications (OBJ 3.3) 15:36 -
Cloud Attacks (PT0-002)
Video Name Time 1. Cloud Attacks (OBJ 3.4) 2:08 2. Attacking the Cloud (OBJ 3.4) 6:54 3. Credential Harvesting (OBJ 3.4) 8:17 4. Misconfigured Assets (OBJ 3.4) 12:12 5. Metadata Service Attack (OBJ 3.4) 4:32 6. Software Development Kit (SDK) (OBJ 3.4) 2:55 7. Auditing the Cloud (OBJ 3.4) 5:04 8. Conducting Cloud Audits (OBJ 3.4) 13:59 -
Attacks on Mobile Devices (PT0-002)
Video Name Time 1. Attacks on Mobile Devices (OBJ 3.5) 4:46 2. Enterprise Mobility Management (OBJ 3.5) 9:32 3. Deployment Options (OBJ 3.5) 4:34 4. Mobile Reconnaissance Concerns (OBJ 3.5) 7:57 5. Mobile Device Insecurity (OBJ 3.5) 12:15 6. Multifactor Authentication (OBJ 3.5) 12:11 7. Mobile Device Attacks (OBJ 3.5) 5:14 8. Malware Analysis (OBJ 3.5) 13:13 9. Conducting Malware Analysis (OBJ 3.5) 25:55 10. Mobile Device Tools (OBJ 3.5) 8:21 -
Attacks on Specialized Systems (PT0-002)
Video Name Time 1. Attacks on Specialized Systems (OBJ 3.5) 2:44 2. Internet of Things (IoT) Devices (OBJ 3.5) 8:17 3. Internet of Things (IoT) Vulnerabilities (OBJ 3.5) 7:35 4. Embedded Systems (OBJ 3.5) 6:45 5. ICS and SCADA Devices (OBJ 3.5) 9:16 6. ICS Protocols and Vulnerabilities (OBJ 3.5) 10:51 7. Data Storage Vulnerabilities (OBJ 3.5) 5:58 8. Virtual Environments (OBJ 3.5) 8:16 9. Virtual Machine Attacks (OBJ 3.5) 5:56 10. Containerization (OBJ 3.5 5:45 -
Post-exploitation (PT0-002)
Video Name Time 1. Post-exploitation (OBJ 3.7) 2:51 2. Enumerating the Network (OBJ 3.7) 4:04 3. Network Segmentation Testing (OBJ 3.7) 3:10 4. Lateral Movement and Pivoting (OBJ 3.7) 2:58 5. Pass the Hash (OBJ 3.7) 7:49 6. Golden Ticket (OBJ 3.7) 6:05 7. Lateral Movement (OBJ 3.7) 8:31 8. Pivoting (3.7) 7:42 9. Escalating Privileges (OBJ 3.7) 19:14 10. Upgrading Restrictive Shells (OBJ 3.7) 5:26 -
Detection Avoidance (PT0-002)
Video Name Time 1. Detection Avoidance (OBJ 3.7) 1:31 2. Trojans and Backdoors (OBJ 3.7) 4:20 3. Creating Persistence (OBJ 3.7) 13:51 4. Living Off the Land (OBJ 3.7) 12:01 5. Data Exfiltration (OBJ 3.7) 6:46 6. Covert Channels (OBJ 3.7) 4:44 7. Steganography (3.7) 2:58 8. Covering Your Tracks (OBJ 3.7) 10:03 9. Persistence and Covering Your Tracks (OBJ 3.7) 8:44 10. Post-Exploitation Tools (OBJ 3.7) 3:00 -
Communication and Reports (PT0-002)
Video Name Time 1. Communication and Reports (OBJ 4.3) 1:44 2. Communication Paths (OBJ 4.3) 5:25 3. Communication Triggers (OBJ 4.3) 4:36 4. Reasons for Communication (OBJ 4.3) 10:18 5. Presentation of Findings (4.1 & OBJ 4.3) 6:05 6. Report Data Gathering (OBJ 4.1) 3:38 7. Written Reports (OBJ 4.1) 14:44 8. Common Themes (OBJ 4.1) 3:01 9. Securing and Storing Reports (OBJ 4.1) 5:06 -
Findings and Remediations (PT0-002)
Video Name Time 1. Findings and Remediations (OBJ 4.2) 2:32 2. Security Control Categories (OBJ 4.2) 13:35 3. Selecting Security Controls (OBJ 4.2) 3:56 4. Physical Controls (OBJ 4.2) 6:55 5. Operational Controls (OBJ 4.2) 10:22 6. Administrative Controls (OBJ 4.2) 14:23 7. System Hardening (OBJ 4.2) 10:55 8. Secure Coding (OBJ 4.2) 8:19 9. Implementing MFA (OBJ 4.2) 6:21 10. Digital Certificates (OBJ 4.2) 9:47 11. Other Technical Controls (OBJ 4.2) 2:41 12. Mitigation Strategies (OBJ 4.2) 8:07 -
Post-report Activities (PT0-002)
Video Name Time 1. Post-report Activities (OBJ 4.2) 2:42 2. Removing Shells and Tools (OBJ 4.2) 2:53 3. Deleting Test Credentials (OBJ 4.2) 1:53 4. Destroy Test Data (OBJ 4.2) 2:51 5. Client Acceptance (OBJ 4.2) 2:57 6. Attestation of Findings (OBJ 4.2) 3:00 7. Lessons Learned (OBJ 4.2) 4:04 8. Retesting (OBJ 4.2) 2:42 -
Scripting Basics (PT0-002)
Video Name Time 1. Scripting Basics (OBJ 5.1 & OBJ 5.2) 2:24 2. Scripting Tools (OBJ 5.2) 9:50 3. Variables (OBJ 5.1) 7:52 4. Loops (OBJ 5.1) 5:20 5. Logic Control (OBJ 5.1) 4:35 6. Data Structures (OBJ 5.1) 12:40 7. Object Oriented Programming (OBJ 5.1) 6:59 -
Analyzing Scripts (PT0-002)
Video Name Time 1. Analyzing Scripts (OBJ 5.2) 5:18 2. Coding in Bash (OBJ 5.2) 21:17 3. Bash Example (OBJ 5.2) 4:35 4. Coding in PowerShell (OBJ 5.2) 15:41 5. PowerShell Example (OBJ 5.2) 3:25 6. Coding in Python (OBJ 5.2) 19:52 7. Python Example (OBJ 5.2) 3:40 8. Coding in Perl (OBJ 5.2) 17:24 9. Perl Example (OBJ 5.2) 16:11 10. Coding in JavaScript (OBJ 5.2) 19:22 11. JavaScript Example (OBJ 5.2) 9:48 12. Coding in Ruby (OBJ 5.2) 13:43 13. Ruby Example (OBJ 5.2) 4:15 -
Expoits and Automation (PT0-002)
Video Name Time 1. Exploits and Automation (OBJ 5.2) 1:37 2. Exploits to Download Files (OBJ 5.2) 4:27 3. Exploits for Remote Access (OBJ 5.2) 9:26 4. Exploits for Enumerating Users (OBJ 5.2) 5:57 5. Exploits for Enumerating Assets (OBJ 5.2) 5:24 6. Automation in Engagements (OBJ 5.2) 3:28 7. Automation with Nmap Scripts (OBJ 5.2) 2:35 -
Tool Round-up (PT0-002)
Video Name Time 1. Tool Round-up (OBJ 5.3) 2:54 2. OSINT Tools (OBJ 5.3) 6:14 3. Scanning Tools (OBJ 5.3) 6:40 4. Networking Tools (OBJ 5.3) 2:31 5. Wireless Tools (OBJ 5.3) 7:37 6. Social Engineering Tools (OBJ 5.3) 2:36 7. Remote Access Tools (OBJ 5.3) 4:24 8. Credential Testing Tools (OBJ 5.3) 7:39 9. Web Application Tools (OBJ 5.3) 2:26 10. Cloud Tools (OBJ 5.3) 2:59 11. Steganography Tools (OBJ 5.3) 6:35 12. Debuggers (OBJ 5.3) 5:32 13. Miscellaneous Tools (OBJ 5.3) 9:27 -
Conclusion (PT0-002)
Video Name Time 1. Conclusion 9:13
Add Comment