Module 01 – PLANNING AND SCOPING
- Workbook (Pdf)
- Overview
- Planning An Engagement
- Planning On Engagement Part 2
- Planning An Engagement Part 3
- Planning An Engagement Part 4
- Legal Concepts
- Scoping An Engagement
- Scoping An Engagement Part 2
- Compliance-Based Assessments
- Review Quiz (Number of attempts allowed: Unlimited)
Module 03 – ATTACKS AND EXPLOITS
- Workbook (Pdf)
- Info Gathering Techniques
- Info Gathering Techniques Part 2
- Info Gathering Techniques Part 3
- Info Gathering Techniques Part 4
- Perform Vulnerability Scans
- Perform Vulnerability Scans Part 2
- Perform Vulnerability Scans Part 3
- Perform Vulnerability Scans Part 4
- Vulnerability Scan Results
- Exploration Preparation
- Exploration Preparation Part 2
- Weaknesses In Specialized Systems
- Weaknesses In Specialized Systems Part 2
- Review Quiz (Number of attempts allowed: Unlimited)
Module 05 – REPORTING AND COMMUNICATION
- Workbook (Pdf)
- Reports
- Post Report Activities
- Vulnerability Mitigation Strategies
- Communication Importance
- Review Quiz (Number of attempts allowed: Unlimited)
Module 02 – INFORMATION GATHERING AND VULNERABILITY IDENTIFICATION
- Workbook (Pdf)
- Pentesting Tools: Use Cases
- Pentesting Tools: Use Cases Part 2
- Pentesting Tools: Scanners
- Pentesting Tools: Credential Testing
- Pentesting Tools: Credential Testing Part 2
- Pentesting Tools: Web Directory Enum
- Pentesting Tools: Debuggers
- Pentesting Tools: OSINT
- Pentesting Tools: Wireless
- Pentesting Tools: Web Proxies
- Pentesting Tools: Social Engineering
- Pentesting Tools: Remote Access
- Pentesting Tools: Networking
- Pentesting Tools: Misc
- Pentesting Tools: Mobile
- Nmap
- Common Pentest Objectives
- Analyze Scripts: Bash
- Analyze Scripts: Bash Part 2
- Analyze Scripts: Bash Part 3
- Analyze Scripts: Python
- Analyze Scripts: Python Part 2
- Analyze Scripts: Python Part 3
- Analyze Scripts: Ruby
- Analyze Scripts: Ruby Part 2
- Analyze Scripts: PowerShell
- Analyze Scripts: Powershell Part 2
- Review Quiz (Number of attempts allowed: Unlimited)
Module 04 – PENETRATION TESTING TOOLS
- Workbook (Pdf)
- Social Engineering
- Social Engineering Part 2
- Network Vulnerability: Name Resolution
- Network Vulnerability: SNMP, SMTP And FTP
- Network Vulnerability: Pass-The-Hash
- Network Vulnerabilities: MITM
- Network Vulnerability Denial Of Service
- Network Vulnerabilities: NAC Bypass, VLAN Hopping
- App Vulnerabilities Injection Attacks
- App Vulnerabilities Injection Attacks Part 2
- App Vulnerabilities: Injection Attacks Part 3
- App Vulnerabilities: File Inclusions
- App Vulnerabilities: File Inclusions Part 2
- App Vulnerabilities: XSS, CSRF, Clickjacking
- App Vulnerabilities: XSS, CSRF, Clickjacking Pt2
- App Vulnerabilities: Authentication, Authorization
- App Vulnerabilities: Insecure Coding
- App Vulnerabilities: Insecure Coding Part 2
- Wireless And RF Vulnerabilities
- Wireless And RF Vulnerabilities Part 2
- Host-Based Vulnerabilities
- Host Based Vulnerabilities Part 2
- Host Based Vulnerabilites Part 3
- Host-Based Vulnerabilities Part 4
- Host-Based Vulnerabilities Part 5
- Site Security
- Site Security Part 2
- Post-Exploitation
- Post-Exploitation Part 2
- Review Quiz (Number of attempts allowed: Unlimited)