Example Curriculum
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 1.Penetration Testing Process - Module Overview (3:39)
- 2.Penetration Testing Methodology (8:11)
- 3.Metrics & Why They Are Important (12:05)
- 4.Metrics
- 5.Routine Assessments Part 1 - What Are Routine Assessments (4:25)
- 6.Routine Assessments Part 2 - Yearly Assessments (5:28)
- 7.Routine Assessments Part 3 - Quarterly Assessments (9:17)
- 8.Routine Assessments Part 4- Monthly Assessments (4:31)
- 9.Routine Assessments Part 5 - Constant Assessments (8:11)
- 10.Routine Assessments Part 6 - Building an Assessment Plan (7:21)
- 11.Assessment Template
- 12.Building & Working with an Enterprise Budget (12:15)
- 13.Budget Sample
- 14.Budget Template
- 15.Specialties (3:58)
- 16.The CIA Triangle (3:09)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 1.Windows Internals - UAC (8:38)
- 2.Windows Internals - Permissions (16:45)
- 3.Windows Internals - Alternate Data Streams (8:44)
- 4.Windows Internals - API Calls (12:35)
- 5.Windows Internals - The SID (6:11)
- 6.Windows Internals - Tokens (7:49)
- 7.Windows Internals - Named Pipes (6:01)
- 8.Windows Internals - PE Files & DLLs (16:08)
Available in
days
days
after you enroll
- 1.Windows Command Line - Accessing the Command Line (4:56)
- 2.Windows Command Line - Navigation (7:04)
- 3.Windows Command Line - Working with Files and Directories (7:31)
- 4.Windows Command Line - Working with Pipes (9:32)
- 5.Windows Command Line - Standard IOE (3:56)
- 6.Windows Command Line - Managing Windows (12:07)
Available in
days
days
after you enroll
- 1.Where is the GUI (3:50)
- 2.The Linux File System (5:39)
- 3.Linux Command Line - Navigation (4:27)
- 4.Linux Command Line - Working with Files and Directories (8:42)
- 5.Linux Command Line - Standard IOE Recap (3:48)
- 6.Linux Command Line - Working with Data (13:32)
- 7.Linux Command Line - Working with File Permissions (9:39)
- 8.Linux Command Line - Man Pages (3:39)
- 9.Linux Command Line - Base64 (2:56)
- 10.Linux Command Line - Hex (6:26)
- 11.Linux Command Line - Network Connections Recap (3:58)
- 12.Linux Processes (13:00)
- 13.What are INodes (4:30)
- 14.Working with Open Files (6:38)
- 15.Symbolic Links (5:49)
- 16.The IDs (2:58)
- 17.Linux Pipes (3:19)
- 18.Linux Run Levels (3:49)
- 19.Linux Logs (3:43)
Available in
days
days
after you enroll
- 1.The Kernel (11:10)
- 2.One Ring to Rule Them All (5:40)
- 3.What is a CPU (2:40)
- 4.The CPU Registers (9:16)
- 5.The CPU Flags (2:08)
- 6.What is Memory & How does it work (3:35)
- 7.The Stack (5:46)
- 8.The Heap (3:23)
- 9.Extra information on Memory (4:06)
- 10.Debuggers (5:10)
- 11.Taking a look at ASLR (3:22)
- 12.A Quick Word About AntiVirus (5:13)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 1.What is Encryption (3:24)
- 2.Symmetric Encryption (3:39)
- 3.Asymmetric Encryption (5:02)
- 4.RSA Encryption (2:07)
- 5.AES Encryption (1:42)
- 6.What is Hashing (3:06)
- 7.MD5 Hashing (2:34)
- 8.SHA Hashing (4:28)
- 9.What is Encoding (2:08)
- 10.Base64 Encoding (4:06)
- 11.Hex Encoding (4:24)
- 12.URL Encoding (2:52)
- 13.What is Compression (3:04)
- 14.Lossless vs Lossy Compression (3:08)
- 15.LZ77 & LZ78 Compression Algorithms (2:03)
- 16.Data Manipulation - Hands On (1:54)
Available in
days
days
after you enroll
- 1.What is Networking (8:16)
- 2.The OSI Model (5:20)
- 3.TCPIP (9:56)
- 4.UDP (2:38)
- 5.The Switch (4:07)
- 6.Routers & Gateways (6:08)
- 7.What is a Protocol (1:26)
- 8.ICMP (6:00)
- 9.DNS (8:12)
- 10.DHCP (6:03)
- 11.ARP (4:33)
- 12.What is an IDS (3:30)
- 13.What is an IPS (4:45)
- 14.What is HA (4:35)
- 15.Proxys (3:17)
- 16.The DMZ (2:36)
- 17.Quick Talk on Databases (4:17)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 1.Why Python (3:45)
- 2.Installing Python (3:37)
- 3.Hello World (6:46)
- 4.Variables (7:41)
- 5.Type Casting (4:55)
- 6.Operators (4:41)
- 7.IfElse (13:28)
- 8.Loops (8:38)
- 9.The Dictionary (9:42)
- 10.Lists (10:20)
- 11.Tuples (4:12)
- 12.Modules (6:06)
- 13.Classes (11:37)
- 14.Inheritance (14:30)
- 15.Configuration Files (5:00)
- 16.Logging (6:50)
- 17.Error Handling (6:58)
- 18.Sockets (11:14)
- 19.Threading (7:03)
- 20.Python Hands On (2:32)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 1.What is Reconnaissance (3:49)
- 2.Installing Kali (6:33)
- 3.Passive Recon - Google (9:35)
- 4.Passive Recon - Shodan (5:20)
- 5.Passive Recon - Whois (6:48)
- 6.Passive Recon - Netcraft (7:18)
- 7.Passive Recon - Job Posting (7:27)
- 8.Active Recon - Port Scanning (21:46)
- 9.Active Recon - DNS (8:27)
- 10.Active Recon - Nikto (6:12)
- 12.Active Recon - Sparta (8:24)
- 11.Active Recon - Dirb (4:41)
- 13.Active Recon - Working with NC (13:11)
- 14.Active Recon - Banner Grabbing (7:23)
- 15.Active Recon - Vulnerability Scanners (4:49)
- 16.Active Recon - Browsing (6:20)
- 17.Active Recon - Manual vs Automated (4:04)
- 18.Reconnaissance Hands On (1:33)
Available in
days
days
after you enroll
- 1.Finding Exploits (10:45)
- 2.Misconfigurations (3:47)
- 3.Looking for 0 days (4:18)
- 4.What is Metasploit (8:18)
- 5.Metasploit - Exploits and Payloads (15:29)
- 6.Metasploit - The Meterpreter (13:51)
- 7.Metasploit - Adding an Exploit to Metasploit (10:12)
- 8.Metasploit - MSFVenom (7:59)
- 9.Metasploit - Hands On (3:00)
- 10.The OWASP Top 10 (7:46)
- 11.SQL Injection-SQLMap (30:15)
- 12.XSS (13:25)
- 13.Insecure Direct Object Reference (5:37)
- 14.Local File Inclusion (11:29)
- 15.Remote File Inclusion (8:31)
- 16.The Authenticated Unauthenticated Pages (5:13)
- 17.Broken Authentication and Session Management (7:47)
- 18.Faulty Redirects (3:41)
Available in
days
days
after you enroll
- 1.Stabilizing Shells (14:04)
- 2.Breaking Out Of The Jail Shell (8:42)
- 3.What is Persistence (2:40)
- 4.Windows Persistence (10:18)
- 5.Linux Persistence (10:47)
- 6.What is Privilege Escalation (4:23)
- 7.OS Version (10:55)
- 8.Common Configuration Issues (12:12)
- 9.File Permissions (15:08)
- 10.MySQL (14:32)
- 11.Sudo (9:37)
- 12.Relative Path Sudo Binary (8:19)
- 13.Unquoted Service Path (14:31)
- 14.Service Misconfigurations (7:46)
- 15.LinuxPrivChecker (7:33)
- 16.Im Root Now What (2:53)
- 17.Pulling Hashes (9:33)
- 18.Pass The Hash (4:40)
- 19.SSH Keys (5:05)
- 20.Checking Logs (1:58)
- 21.Duel Homed Machines (2:00)
- 22.Network Traffic (7:19)
- 23.ARP Poisoning (7:08)
- 24.Web Servers (2:20)
- 26.Password Spraying (5:51)
- 25.Account Directory Attacks (3:53)
- 27.SSH Tunneling (12:15)
- 28.Pivoting (13:26)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 1.The Resume (7:59)
- 2.Professional Email (4:51)
- 3.Certifications (12:25)
- 4.Personal Brand (11:13)
- 5.Searching for the Job (11:40)
- 6.Analyzing the Job Post (22:13)
- 7.Applying for the Job (4:30)
- 8.The Future Company (8:37)
- 9.Salary Requirements (12:16)
- 10.The Interview Process - The Screening Call (8:00)
- 11.The Interview Process - Prepping for the Technical Interviews (9:11)
- 12.The Interview Process - The Technical Screening Interview (10:46)
- 16.Congratulations (0:21)
- 13.The Interview Process - Prepping for the On Site Final Interview (4:31)
- 14.The Interview Process - The Onsite (5:55)
- 15.The Interview Process - The Offer (11:10)
Check your inbox to confirm your subscription