| 11.2.1 Understanding the Red Team Environment.mp4 | 624.99 MB |
| 04.1.2 Understanding Enterprise Wide Penetration Testing.mp4 | 453.29 MB |
| 03.1.1 Introducing Red Teams and Enterprise Hacking.mp4 | 314.52 MB |
| 14.3.1 Surveying Social Engineering Methodologies.mp4 | 231.24 MB |
| 33.6.3 Exploring the Hidden Cost of Open Source Software.mp4 | 222.64 MB |
| 37.7.2 Understanding Lateral Movement.mp4 | 217.48 MB |
| 07.1.5 Surveying Operational Processes and Policies for the Red Team.mp4 | 212.22 MB |
| 49.9.1 Understanding the Challenge of Testing Cloud Services.mp4 | 210.69 MB |
| 21.4.4 Exploring How to Automate Scans.mp4 | 205.71 MB |
| 16.3.3 Exploiting Social Engineering Tools.mp4 | 192.47 MB |
| 06.1.4 Exploring How to Plan and Fund a Red Team.mp4 | 186.02 MB |
| 50.9.2 Exploring How to Test in the Cloud.mp4 | 181.58 MB |
| 34.6.4 Learning How to Host Enterprise Capture the Flag Events.mp4 | 179.39 MB |
| 28.5.2 Exploring Web App Testing Essential Tools.mp4 | 171.68 MB |
| 05.1.3 Understanding the Difference Between Red and Blue Teams.mp4 | 159.53 MB |
| 15.3.2 Understanding How to Target Employees.mp4 | 156.81 MB |
| 09.1.7 Understanding Red Team Collaboration.mp4 | 150.8 MB |
| 23.4.6 Exploring Vulnerability Scanners.mp4 | 149.19 MB |
| 45.8.6 Searching for Sensitive Data.mp4 | 141.63 MB |
| 08.1.6 Understanding How to Create and Hire the Red Team.mp4 | 136.64 MB |
| 12.2.2 Understanding Passive Recon.mp4 | 135.81 MB |
| 01.Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking - Introduction.mp4 | 132.89 MB |
| 42.8.3 Understanding How to Compromise User Credentials.mp4 | 127.78 MB |
| 22.4.5 Using Shodan and Its API.mp4 | 106.18 MB |
| 46.8.7 Understanding Data Exfiltration Techniques.mp4 | 103.15 MB |
| 29.5.3 Understanding Enterprise Application Continuous Testing.mp4 | 94.67 MB |
| 54.Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking - Summary.mp4 | 92.16 MB |
| 19.4.2 Understanding the Operational Impact of Enterprise-wide Scanning.mp4 | 80.06 MB |
| 41.8.2 Learning How to Achieve Domain Admin Access.mp4 | 79.38 MB |
| 47.8.8 Understanding How to Cover Your Tracks.mp4 | 78.16 MB |
| 36.7.1 Learning Privilege Escalation Methodologies.mp4 | 74.06 MB |
| 52.10.1 Surveying Final Reports for Transactional Penetration Testing Events.mp4 | 73.71 MB |
| 32.6.2 Understanding What Hosts to Target and the Scope of the Testing.mp4 | 69.96 MB |
| 18.4.1 Exploring Network and Vulnerability Scanning Methodologies.mp4 | 69.14 MB |
| 02.Learning objectives.mp4 | 67.43 MB |
| 38.7.3 Surveying Privilege Escalation Essential Tools.mp4 | 60.55 MB |
| 39.Learning objectives.mp4 | 55.28 MB |
| 43.8.4 Surveying Password Cracking & Reporting.mp4 | 48.04 MB |
| 24.4.7 Understanding Binary and Source Code Scanners.mp4 | 46.07 MB |
| 20.4.3 Understanding Scanning Tools.mp4 | 45.51 MB |
| 17.Learning objectives.mp4 | 40.37 MB |
| 27.5.1 Exploring How to Target Hosts.mp4 | 40.04 MB |
| 25.4.8 Understanding How to Perform Continuous Monitoring.mp4 | 39.44 MB |
| 44.8.5 Understanding That Domain Admin Is Not the End Goal.mp4 | 36.46 MB |
| 35.Learning objectives.mp4 | 31.62 MB |
| 10.Learning objectives.mp4 | 31.11 MB |
| 26.Learning objectives.mp4 | 29.38 MB |
| 53.10.2 Surveying Continouos Reporting for Enterprise Continuous Monitoring.mp4 | 29 MB |
| 31.6.1 Understanding How to Initially Get on the Network.mp4 | 27.47 MB |
| 48.Learning objectives.mp4 | 26.04 MB |