Section 1 : Introduction
|
Lecture 1 | Welcome to the course | 00:04:14 Duration |
|
Lecture 2 | Exam Foundations | 00:04:41 Duration |
|
Lecture 3 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
Lecture 4 | How to Schedule Your Exam | 00:03:30 Duration |
Section 2 : Domain 1 Planning and Scoping
|
Lecture 1 | Planning and Scoping (Overview) | 00:01:24 Duration |
|
Lecture 2 | Penetration Testing Methodology | 00:02:59 Duration |
|
Lecture 3 | Planning a Penetration Test | |
|
Lecture 4 | Rules of Engagement | 00:05:35 Duration |
|
Lecture 5 | Legal Concepts | 00:10:57 Duration |
|
Lecture 6 | Testing Strategies | 00:03:01 Duration |
|
Lecture 7 | White Box Support Resources | 00:06:31 Duration |
|
Lecture 8 | Types of Assessments | 00:05:44 Duration |
|
Lecture 9 | Threat Actors | 00:07:38 Duration |
|
Lecture 10 | Target Selection | 00:05:12 Duration |
|
Lecture 11 | Other Scoping Considerations | 00:07:07 Duration |
Section 3 : Domain 2 Information Gathering and Vulnerability Identification
|
Lecture 1 | Information Gathering and Vulnerability Identification (Overview) | 00:02:37 Duration |
|
Lecture 2 | Information Gathering | 00:10:08 Duration |
|
Lecture 3 | Reconnaissance with CentralOps (Demo) | 00:13:15 Duration |
|
Lecture 4 | Scanning and Enumeration | 00:04:26 Duration |
|
Lecture 5 | Fingerprinting | 00:04:15 Duration |
|
Lecture 6 | Scanning and Enumeration (Demo) | 00:15:52 Duration |
|
Lecture 7 | Cryptographic Inspection | 00:01:29 Duration |
|
Lecture 8 | Eavesdropping | 00:03:21 Duration |
|
Lecture 9 | Decompiling and Debugging | 00:02:49 Duration |
|
Lecture 10 | Open Source Research | 00:06:14 Duration |
|
Lecture 11 | Vulnerability Scanning | 00:08:48 Duration |
|
Lecture 12 | Scanning Considerations | |
|
Lecture 13 | Application and Container Scans | 00:02:53 Duration |
|
Lecture 14 | Analyzing Vulnerability Scans | 00:07:08 Duration |
|
Lecture 15 | Leverage Information for Exploit | |
|
Lecture 16 | Common Attack Vectors | 00:06:23 Duration |
|
Lecture 17 | Weaknesses in Specialized Systems | 00:10:27 Duration |
Section 4 : Domain 3 Attacks and Exploits
|
Lecture 1 | Attacks and Exploits (Overview) | 00:01:57 Duration |
|
Lecture 2 | Social Engineering | 00:12:15 Duration |
|
Lecture 3 | Motivation Factors | 00:07:12 Duration |
|
Lecture 4 | Physical Security Attacks | 00:05:27 Duration |
|
Lecture 5 | Lock Picking (Demo) | 00:01:25 Duration |
|
Lecture 6 | Network-based Vulnerabilities | 00:13:44 Duration |
|
Lecture 7 | Wireless-based Vulnerabilities | 00:08:44 Duration |
|
Lecture 8 | Wireless Network Attack (Demo) | 00:05:49 Duration |
|
Lecture 9 | Application-based Vulnerabilities | 00:18:51 Duration |
|
Lecture 10 | Local Host Vulnerabilities | 00:02:57 Duration |
|
Lecture 11 | Privilege Escalation (Linux) | 00:04:47 Duration |
|
Lecture 12 | Privilege Escalation (Windows) | 00:10:40 Duration |
|
Lecture 13 | Privilege Escalation | 00:05:07 Duration |
|
Lecture 14 | Privilege Escalation (Demo) | 00:04:27 Duration |
|
Lecture 15 | Lateral Movement | 00:09:08 Duration |
|
Lecture 16 | Persistence | 00:06:46 Duration |
|
Lecture 17 | Covering Your Tracks | 00:05:37 Duration |
|
Lecture 18 | Persistence and Covering Tracks (Demo) |
Section 5 : Domain 4 Penetration Testing Tools
|
Lecture 1 | Penetration Testing Tools (Overview) | 00:02:45 Duration |
|
Lecture 2 | Nmap Usage | 00:10:13 Duration |
|
Lecture 3 | Nmap Usage (Demo) | 00:11:51 Duration |
|
Lecture 4 | Use Cases for Tools | 00:07:25 Duration |
|
Lecture 5 | Scanners | 00:02:04 Duration |
|
Lecture 6 | Credential Testing Tools | 00:06:40 Duration |
|
Lecture 7 | Password Cracking (Demo) | 00:02:15 Duration |
|
Lecture 8 | Debuggers | 00:02:38 Duration |
|
Lecture 9 | Software Assurance | |
|
Lecture 10 | OSINT | 00:04:45 Duration |
|
Lecture 11 | Wireless | 00:01:45 Duration |
|
Lecture 12 | Web Proxies | 00:08:55 Duration |
|
Lecture 13 | Social Engineering Tools | 00:01:14 Duration |
|
Lecture 14 | Remote Access Tools | 00:07:21 Duration |
|
Lecture 15 | Networking Tools | 00:01:31 Duration |
|
Lecture 16 | Mobile Tools | 00:02:01 Duration |
|
Lecture 17 | Miscellaneous Tools | 00:04:24 Duration |
|
Lecture 18 | Intro to Programming | 00:02:54 Duration |
|
Lecture 19 | Programming Concepts | 00:21:48 Duration |
|
Lecture 20 | BASH Script Example | 00:04:31 Duration |
|
Lecture 21 | Python Script Example | 00:03:42 Duration |
|
Lecture 22 | PowerShell Script Example | 00:03:24 Duration |
|
Lecture 23 | Ruby Script Example | 00:04:25 Duration |
Section 6 : Domain 5 Reporting and Communication
|
Lecture 1 | Reporting and Communication (Overview) | 00:01:51 Duration |
|
Lecture 2 | Pentest Communications | 00:08:38 Duration |
|
Lecture 3 | Report Writing | 00:07:55 Duration |
|
Lecture 4 | Mitigation Strategies | 00:07:24 Duration |
|
Lecture 5 | Post-Report Activities | 00:04:16 Duration |
|
Lecture 6 | Pentest Report Example | 00:00:43 Duration |
Section 7 : Conclusion
|
Lecture 1 | Conclusion | 00:01:55 Duration |
|
Lecture 2 | Creating Your Pentest Lab | 00:08:04 Duration |