CBT Nuggets | Penetration Testing Tools [FCO]
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size6.5 GB
- Uploaded BySunRiseZone
- Downloads245
- Last checkedJul. 14th '22
- Date uploadedJul. 11th '22
- Seeders 34
- Leechers11
Lynda and other Courses >>> https://freecoursesonline.me/
Forum for discussion >>> https://1hack.us/
CBT Nuggets - Penetration Testing Tools [FCO]
Penetration Testing Tools Online Training
This intermediate Penetration Testing Tools training prepares learners to recognize when to use different tools and software to round out their penetration testing repertoire and provide an understanding of a target's vulnerabilities. This training is also associated with the CompTIA PenTest+ certification.
In the world of network and system security, few subjects carry as much excitement or mystery as penetration testing. But penetration testing has a dirty little secret: a lot of the work is done with industry tools. Sure they're not fire-and-forget or mindless seek-and-destroy missiles, but a lot of the mystique that surrounds penetration tests can, in fact, be duplicated.
This Penetration Testing Tools training familiarizes security technicians with many of the tools that can be used to carry out penetration tests and secure networks against real threats.
For anyone who leads a technology team, this CompTIA training can be used to onboard new security technicians, curated into individual or team training plans, or as a CompTIA reference resource.
Penetration Testing Tools: What You Need to Know
This Penetration Testing Tools training has videos that cover topics such as:
• Identifying vulnerabilities and building a plan of attack
• Exploiting targets revealed in scans and attacking devices
• Deploying industry pentest tools like Kali, network mappers, password crackers, and more
Who Should Take Penetration Testing Tools Training?
This Penetration Testing Tools training is considered foundational-level CompTIA training, which means it was designed for security technicians. This pentration testing skills course is valuable for new IT professionals with at least a year of experience with penetration testing tools and experienced security technicians looking to validate their CompTIA skills.
New or aspiring security technicians. For brand new security technicians, this Penetration Testing Tools training might be slightly specialized -- there are fundamentals about network security that will provide a better foundation for a career at the very outset. However, learning how to use the tools used in penetration tests can make you a better network security operator and can eventually lead to getting placed on pentest teams -- prepare for that eventuality with this training.
Experienced security technicians. If you've been working as a security technician for several years and you've been itching to advance in your career into doing penetration tests, this training will familiarize you with the tools that make them happen. Some are open source, others are paid products, but knowing the tools that support penetration testing can prepare you for the more advanced work of pentests and secure your place on those teams.
About Author
Bob Salmans - Nugget trainer since 2020
“I love seeing and helping people advance through life. It's my small part in contributing to the advancement of the security community.”
Bob got his start in IT after enlisting in the United States Navy and being assigned to a network engineer role. He brings seven years of IT training experience to CBT Nuggets along with over 20 years of IT experience. Bob was a security team lead for a managed services provider before joining CBTN. In his spare time, he enjoys spending time with his family, cooking, and metal and woodworking.
General Info:
Author
: Bob Salmans
Language
: English
Released
: 2022
Duration
: 19h 9m
Course Source
: https://www.cbtnuggets.com/it-training/cyber-security/penetration-testing-tools
Files:
[FreeCoursesOnline.Me] CBTNugget - Penetration Testing Tools 0. Websites you may like- 1. Get Free Premium Accounts Daily On Our Discord Server!.txt (1.3 KB)
- 2. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url (0.4 KB)
- 3. FTUApps.com Download Cracked Developers Applications For Free.url (0.2 KB)
- 4. FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url (0.3 KB)
- 1. Pentesting Reconnaissance.mp4 (25.5 MB)
- 10. Basic NMAP Commands.mp4 (28.1 MB)
- 100. Linux SUID and SUDO privilege escalation.mp4 (41.4 MB)
- 101. Linux Local Exploit Privilege Escalation.mp4 (80.3 MB)
- 102. Physical Pentest Documents.mp4 (38.3 MB)
- 103. Reconnaissance and Planning.mp4 (29.2 MB)
- 104. Physical Pentest Tools.mp4 (53.2 MB)
- 105. Getting Inside.mp4 (33.5 MB)
- 106. Continuing From the Inside.mp4 (31.2 MB)
- 107. Physical Pentest Report.mp4 (28.0 MB)
- 108. Credential Attacks Pt.1.mp4 (38.0 MB)
- 109Credential Attacks Pt.2.mp4 (42.9 MB)
- 11. Ping Scans with NMAP.mp4 (22.4 MB)
- 110. Creating Custom Wordlists.mp4 (61.0 MB)
- 111. Performing a Brute Force Attack.mp4 (50.5 MB)
- 112. Cracking Hashed Passwords.mp4 (73.0 MB)
- 113. Executing a Pass the Hash Attack.mp4 (27.8 MB)
- 114. Credential Harvesting and PrivEsc in the Cloud.mp4 (55.7 MB)
- 115. Running PACU.mp4 (55.8 MB)
- 116. Misconfigured Cloud Assets.mp4 (39.8 MB)
- 117. Running CloudSploit.mp4 (59.6 MB)
- 118. Resource Exhaustion, Malware Injection and API Attacks.mp4 (29.4 MB)
- 119. Side Channel and Direct-To-Origin Attacks.mp4 (32.2 MB)
- 12. Scanning TCP and UDP with NMAP.mp4 (32.4 MB)
- 120. Additional Cloud Pentesting Tools.mp4 (20.8 MB)
- 121. Mobile Device Attacks.mp4 (20.2 MB)
- 122. Mobile Device Vulnerabilities.mp4 (46.6 MB)
- 123. Mobile Security Tools.mp4 (26.6 MB)
- 124. Internet of Things (IoT) Devices.mp4 (39.7 MB)
- 125. Data Storage System Vulnerabilities.mp4 (34.9 MB)
- 126. SCADA, IIoT and ICS Vulnerabilities.mp4 (28.1 MB)
- 127. Virtual Environment Vulnerabilities.mp4 (28.4 MB)
- 128. Establishing Persistence.mp4 (23.2 MB)
- 129. Lateral Movement.mp4 (41.9 MB)
- 13. Identifying Host Attributes with NMAP.mp4 (38.2 MB)
- 130. Data Exfiltration.mp4 (30.8 MB)
- 131. Covering Your Tracks.mp4 (30.1 MB)
- 132. Linux Post Exploit Activities.mp4 (63.9 MB)
- 133. Windows Post Exploit Activities.mp4 (72.9 MB)
- 134. Analyze a Basic Script.mp4 (81.6 MB)
- 135. Scripting Basics.mp4 (123.2 MB)
- 136. Assigning Values to Variables.mp4 (87.1 MB)
- 137. Operating on Variables with Operators.mp4 (77.4 MB)
- 138. Branching Code with Conditionals.mp4 (83.9 MB)
- 139. Reapeating Code with Loops.mp4 (91.3 MB)
- 14. Using NMAP Scripts.mp4 (33.8 MB)
- 140. Handling Errors in Code.mp4 (88.7 MB)
- 141. Intro.mp4 (16.6 MB)
- 142. Analyzing PING Scripts.mp4 (58.0 MB)
- 143. Downloading Files with Scripts.mp4 (23.4 MB)
- 144. Automation with Scripts.mp4 (85.5 MB)
- 145. Updating IP Settings with a Script.mp4 (37.5 MB)
- 146. NMAP Reports in HTML.mp4 (49.2 MB)
- 15. Bypassing Firewalls with NMAP.mp4 (34.1 MB)
- 16. Intro to Enumerating Services and Vulnerabilities.mp4 (14.2 MB)
- 17. Enumerating with Port Scanners.mp4 (96.2 MB)
- 18. Enumerating Web Servers.mp4 (113.7 MB)
- 19. Enumerating SMB and Shares.mp4 (61.8 MB)
- 2. Pentesting Reconnaissance Tools.mp4 (41.1 MB)
- 20. Enumerating Vulnerabilities with Nessus.mp4 (89.2 MB)
- 21. Automating Enumeration.mp4 (52.2 MB)
- 22. Pentest Enumeration Review.mp4 (18.6 MB)
- 23. Social Engineering Anatomy.mp4 (57.1 MB)
- 24. Social Engineering Attacks.mp4 (40.3 MB)
- 25. Social Engineering Tools.mp4 (40.3 MB)
- 26. Social Engineering Toolkit.mp4 (97.5 MB)
- 27. Using WifiPhisher.mp4 (17.2 MB)
- 28. Pharming With ShellPhish.mp4 (36.6 MB)
- 29. Social Engineering Review.mp4 (20.7 MB)
- 3. Domain Information Tools.mp4 (72.4 MB)
- 30. Exploits and Payloads.mp4 (40.3 MB)
- 31. Moving Files With PwnDrop.mp4 (69.6 MB)
- 32. Transferring Files with SMB and SCP.mp4 (49.2 MB)
- 33. Working With Exploits.mp4 (103.7 MB)
- 34. Working With Payloads.mp4 (46.8 MB)
- 35. Exploits and Payloads Review.mp4 (8.9 MB)
- 36. Intro to the Metasploit Framework.mp4 (23.8 MB)
- 37. Metasploit Startup and Workspaces.mp4 (40.4 MB)
- 38. Metasploit Modules.mp4 (68.4 MB)
- 39. Metasploit Options and Payloads.mp4 (83.3 MB)
- 4. IP and DNS Information Tools.mp4 (51.8 MB)
- 40. Managing Metasploit Sessions.mp4 (22.7 MB)
- 41. Using Meterpreter.mp4 (68.5 MB)
- 42. Metasploit Framework Review.mp4 (10.4 MB)
- 43. Network Based Attacks and Tools.mp4 (53.3 MB)
- 44. How Attacks Against ARP Work.mp4 (31.8 MB)
- 45. ARP Poisoning Attack.mp4 (43.2 MB)
- 46. How DNS Cache Poisoning Works.mp4 (23.3 MB)
- 47. DNS Cache Poisoning Attack.mp4 (29.7 MB)
- 48. VLAN Hopping Attacks.mp4 (22.2 MB)
- 49. Bypassing Network Access Control.mp4 (20.5 MB)
- 5. Combination OSINT Tools.mp4 (72.3 MB)
- 50. Network Based Attacks Review.mp4 (33.2 MB)
- 51. Host Protocol Attacks and Tools Overview.mp4 (25.2 MB)
- 52. Server Message Block (SMB) Protocol.mp4 (25.1 MB)
- 53. Attacking the SMB Protocol.mp4 (70.7 MB)
- 54. Simple Network Management Protocol (SNMP).mp4 (34.5 MB)
- 55. Exploiting the SNMP Protocol.mp4 (83.1 MB)
- 56. Denial of Service Attacks.mp4 (32.5 MB)
- 57. Analyzing the LLMNR Protocol.mp4 (25.7 MB)
- 58. Attacking the LLMNR Protocol.mp4 (35.0 MB)
- 59. Host Protocol Attacks and Tools Review.mp4 (18.6 MB)
- 6. Breach Data Tools.mp4 (24.7 MB)
- 60. Wireless and Mobile Device Attacks and Tools.mp4 (42.3 MB)
- 61. Sniffing Wireless Data.mp4 (40.0 MB)
- 62. Wireless Analysis With K
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- udp://tracker.jordan.im:6969/announce
- udp://tracker.bitsearch.to:1337/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://9.rarbg.to:2780/announce
- udp://fe.dealclub.de:6969/announce
- udp://tracker.openbittorrent.com:1337/announce
- udp://open.stealth.si:80/announce
- udp://9.rarbg.to:2900/announce
- udp://9.rarbg.me:2720/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://tracker.moeking.me:6969/announce