Section 1 : Introduction

Lecture 1 Welcome to the course 00:04:14 Duration
Lecture 2 Exam Foundations 00:04:41 Duration
Lecture 3 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM
Lecture 4 How to Schedule Your Exam 00:03:30 Duration

Section 2 : Domain 1 Planning and Scoping

Lecture 1 Planning and Scoping (Overview) 00:01:24 Duration
Lecture 2 Penetration Testing Methodology 00:02:59 Duration
Lecture 3 Planning a Penetration Test
Lecture 4 Rules of Engagement 00:05:35 Duration
Lecture 5 Legal Concepts 00:10:57 Duration
Lecture 6 Testing Strategies 00:03:01 Duration
Lecture 7 White Box Support Resources 00:06:31 Duration
Lecture 8 Types of Assessments 00:05:44 Duration
Lecture 9 Threat Actors 00:07:38 Duration
Lecture 10 Target Selection 00:05:12 Duration
Lecture 11 Other Scoping Considerations 00:07:07 Duration

Section 3 : Domain 2 Information Gathering and Vulnerability Identification

Lecture 1 Information Gathering and Vulnerability Identification (Overview) 00:02:37 Duration
Lecture 2 Information Gathering 00:10:08 Duration
Lecture 3 Reconnaissance with CentralOps (Demo) 00:13:15 Duration
Lecture 4 Scanning and Enumeration 00:04:26 Duration
Lecture 5 Fingerprinting 00:04:15 Duration
Lecture 6 Scanning and Enumeration (Demo) 00:15:52 Duration
Lecture 7 Cryptographic Inspection 00:01:29 Duration
Lecture 8 Eavesdropping 00:03:21 Duration
Lecture 9 Decompiling and Debugging 00:02:49 Duration
Lecture 10 Open Source Research 00:06:14 Duration
Lecture 11 Vulnerability Scanning 00:08:48 Duration
Lecture 12 Scanning Considerations
Lecture 13 Application and Container Scans 00:02:53 Duration
Lecture 14 Analyzing Vulnerability Scans 00:07:08 Duration
Lecture 15 Leverage Information for Exploit
Lecture 16 Common Attack Vectors 00:06:23 Duration
Lecture 17 Weaknesses in Specialized Systems 00:10:27 Duration

Section 4 : Domain 3 Attacks and Exploits

Lecture 1 Attacks and Exploits (Overview) 00:01:57 Duration
Lecture 2 Social Engineering 00:12:15 Duration
Lecture 3 Motivation Factors 00:07:12 Duration
Lecture 4 Physical Security Attacks 00:05:27 Duration
Lecture 5 Lock Picking (Demo) 00:01:25 Duration
Lecture 6 Network-based Vulnerabilities 00:13:44 Duration
Lecture 7 Wireless-based Vulnerabilities 00:08:44 Duration
Lecture 8 Wireless Network Attack (Demo) 00:05:49 Duration
Lecture 9 Application-based Vulnerabilities 00:18:51 Duration
Lecture 10 Local Host Vulnerabilities 00:02:57 Duration
Lecture 11 Privilege Escalation (Linux) 00:04:47 Duration
Lecture 12 Privilege Escalation (Windows) 00:10:40 Duration
Lecture 13 Privilege Escalation 00:05:07 Duration
Lecture 14 Privilege Escalation (Demo) 00:04:27 Duration
Lecture 15 Lateral Movement 00:09:08 Duration
Lecture 16 Persistence 00:06:46 Duration
Lecture 17 Covering Your Tracks 00:05:37 Duration
Lecture 18 Persistence and Covering Tracks (Demo)

Section 5 : Domain 4 Penetration Testing Tools

Lecture 1 Penetration Testing Tools (Overview) 00:02:45 Duration
Lecture 2 Nmap Usage 00:10:13 Duration
Lecture 3 Nmap Usage (Demo) 00:11:51 Duration
Lecture 4 Use Cases for Tools 00:07:25 Duration
Lecture 5 Scanners 00:02:04 Duration
Lecture 6 Credential Testing Tools 00:06:40 Duration
Lecture 7 Password Cracking (Demo) 00:02:15 Duration
Lecture 8 Debuggers 00:02:38 Duration
Lecture 9 Software Assurance
Lecture 10 OSINT 00:04:45 Duration
Lecture 11 Wireless 00:01:45 Duration
Lecture 12 Web Proxies 00:08:55 Duration
Lecture 13 Social Engineering Tools 00:01:14 Duration
Lecture 14 Remote Access Tools 00:07:21 Duration
Lecture 15 Networking Tools 00:01:31 Duration
Lecture 16 Mobile Tools 00:02:01 Duration
Lecture 17 Miscellaneous Tools 00:04:24 Duration
Lecture 18 Intro to Programming 00:02:54 Duration
Lecture 19 Programming Concepts 00:21:48 Duration
Lecture 20 BASH Script Example 00:04:31 Duration
Lecture 21 Python Script Example 00:03:42 Duration
Lecture 22 PowerShell Script Example 00:03:24 Duration
Lecture 23 Ruby Script Example 00:04:25 Duration

Section 6 : Domain 5 Reporting and Communication

Lecture 1 Reporting and Communication (Overview) 00:01:51 Duration
Lecture 2 Pentest Communications 00:08:38 Duration
Lecture 3 Report Writing 00:07:55 Duration
Lecture 4 Mitigation Strategies 00:07:24 Duration
Lecture 5 Post-Report Activities 00:04:16 Duration
Lecture 6 Pentest Report Example 00:00:43 Duration

Section 7 : Conclusion

Lecture 1 Conclusion 00:01:55 Duration
Lecture 2 Creating Your Pentest Lab 00:08:04 Duration