Section 1 : Introduction

Lecture 1 Welcome to the course 4:14
Lecture 2 Exam Foundations 4:41
Lecture 3 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 4 How to Schedule Your Exam 3:30

Section 2 : Domain 1 Planning and Scoping

Lecture 5 Planning and Scoping (Overview) 1:24
Lecture 6 Penetration Testing Methodology 2:59
Lecture 7 Planning a Penetration Test
Lecture 8 Rules of Engagement 5:35
Lecture 9 Legal Concepts 10:57
Lecture 10 Testing Strategies 3:1
Lecture 11 White Box Support Resources 6:31
Lecture 12 Types of Assessments 5:44
Lecture 13 Threat Actors 7:38
Lecture 14 Target Selection 5:12
Lecture 15 Other Scoping Considerations 7:7

Section 3 : Domain 2 Information Gathering and Vulnerability Identification

Lecture 16 Information Gathering and Vulnerability Identification (Overview) 2:37
Lecture 17 Information Gathering 10:8
Lecture 18 Reconnaissance with CentralOps (Demo) 13:15
Lecture 19 Scanning and Enumeration 4:26
Lecture 20 Fingerprinting 4:15
Lecture 21 Scanning and Enumeration (Demo) 15:52
Lecture 22 Cryptographic Inspection 1:29
Lecture 23 Eavesdropping 3:21
Lecture 24 Decompiling and Debugging 2:49
Lecture 25 Open Source Research 6:14
Lecture 26 Vulnerability Scanning 8:48
Lecture 27 Scanning Considerations
Lecture 28 Application and Container Scans 2:53
Lecture 29 Analyzing Vulnerability Scans 7:8
Lecture 30 Leverage Information for Exploit
Lecture 31 Common Attack Vectors 6:23
Lecture 32 Weaknesses in Specialized Systems 10:27

Section 4 : Domain 3 Attacks and Exploits

Lecture 33 Attacks and Exploits (Overview) 1:57
Lecture 34 Social Engineering 12:15
Lecture 35 Motivation Factors 7:12
Lecture 36 Physical Security Attacks 5:27
Lecture 37 Lock Picking (Demo) 1:25
Lecture 38 Network-based Vulnerabilities 13:44
Lecture 39 Wireless-based Vulnerabilities 8:44
Lecture 40 Wireless Network Attack (Demo) 5:49
Lecture 41 Application-based Vulnerabilities 18:51
Lecture 42 Local Host Vulnerabilities 2:57
Lecture 43 Privilege Escalation (Linux) 4:47
Lecture 44 Privilege Escalation (Windows) 10:40
Lecture 45 Privilege Escalation 5:7
Lecture 46 Privilege Escalation (Demo) 4:27
Lecture 47 Lateral Movement 9:8
Lecture 48 Persistence 6:46
Lecture 49 Covering Your Tracks 5:37
Lecture 50 Persistence and Covering Tracks (Demo)

Section 5 : Domain 4 Penetration Testing Tools

Lecture 51 Penetration Testing Tools (Overview) 2:45
Lecture 52 Nmap Usage 10:13
Lecture 53 Nmap Usage (Demo) 11:51
Lecture 54 Use Cases for Tools 7:25
Lecture 55 Scanners 2:4
Lecture 56 Credential Testing Tools 6:40
Lecture 57 Password Cracking (Demo) 2:15
Lecture 58 Debuggers 2:38
Lecture 59 Software Assurance
Lecture 60 OSINT 4:45
Lecture 61 Wireless 1:45
Lecture 62 Web Proxies 8:55
Lecture 63 Social Engineering Tools 1:14
Lecture 64 Remote Access Tools 7:21
Lecture 65 Networking Tools 1:31
Lecture 66 Mobile Tools 2:1
Lecture 67 Miscellaneous Tools 4:24
Lecture 68 Intro to Programming 2:54
Lecture 69 Programming Concepts 21:48
Lecture 70 BASH Script Example 4:31
Lecture 71 Python Script Example 3:42
Lecture 72 PowerShell Script Example 3:24
Lecture 73 Ruby Script Example 4:25

Section 6 : Domain 5 Reporting and Communication

Lecture 74 Reporting and Communication (Overview) 1:51
Lecture 75 Pentest Communications 8:38
Lecture 76 Report Writing 7:55
Lecture 77 Mitigation Strategies 7:24
Lecture 78 Post-Report Activities 4:16
Lecture 79 Pentest Report Example 0:43

Section 7 : Conclusion

Lecture 80 Conclusion 1:55
Lecture 81 Creating Your Pentest Lab 8:4