48:35
The Pentester Blueprint: A Guide to Becoming a Pentester
Phillip Wylie
1:15:23
Vulnerability Detection & Exploitation
25:00
Lesson 1: Planning and Scoping Pentests
2:09:24
Lesson 2: Conducting Active Recon
2:12:46
Lesson 3: Conducting Passive Recon
51:07
Lesson 3: Non Technical Tests
1:16:30
Lesson 4: Network Attacks
2:01:49
Lesson 5: Analyzing Vulnerabilities
1:34:36
Lesson 6: Penetrating Networks
1:55:26
Lesson 7: Exploiting Host Based Vulnerabilities
1:37:23
Lesson 8: Web App Pentest Demo
50:19
Social Engineering
40:37
Vulnerability Scanning with Nessus
1:46:32
Lesson 10: Analyzing and Reporting Pen Test Results