Redteam Blueprint A Unique Guide To Ethical Hacking Video Training Course & PDF Guides
Duration : 30.5 Hours
Size: 20.4 GB ( PART DOWNLOAD)
# Welcome Who Is This Guy
001 Introduction
1. The 3 Teams
002 Module Overview - The 3 Teams
002 The-3-Teams.pptx
003 The Red Team
003 The-Red-Team.pptx
004 The Blue Team
004 The-Blue-Team.pptx
005 The Purple Team
005 The-Purple-Team.pptx
2. Penetration Testing Process
006 Module Overview - Penetration Testing Process
006 Penetration-Testing-Process-Module-Overview.pptx
007 Penetration Testing Methodology
007 Penetration-Testing-Methodology.pptx
008 Metrics Why They Are Important
008 Metrics.xlsx
009 Routine Assessments Part 1 - What Are Routine Assessments
009 What-Are-Routine-Assessments.pptx
010 Routine Assessments Part 2 - Yearly Assessments
010 Yearly-Assessments.pptx
011 Quarterly-Assessments.pptx
011 Routine Assessments Part 3 - Quarterly Assessments
012 Monthly-Assessments.pptx
012 Routine Assessments Part 4- Monthly Assessments
013 Constant-Assessments.pptx
013 Routine Assessments Part 5 - Constant Assessments
014 Assessment-Template.xlsx
014 Routine Assessments Part 6 - Building an Assessment Plan
015 Budget-Sample.xlsx
015 Budget-Template.xlsx
015 Building Working with an Enterprise Budget
016 Specialties
016 Specialties.pptx
017 CIA-Triangle.pptx
017 The CIA Triangle
3. The Windows Operating System
018 Installing Using VirtualBox for Lab Virtualization
019 Windows at a Glance
020 The Windows File System
020 The-Windows-File-System.pptx
021 Windows Logs
022 Windows Internals - UAC
022 Windows-UAC.pptx
023 Windows Internals - Permissions
024 Windows Internals - Alternate Data Streams
025 API-Calls.pptx
025 Windows Internals - API Calls
026 SID.pptx
026 Windows Internals - The SID
027 Tokens.pptx
027 Windows Internals - Tokens
028 Windows Internals - Named Pipes
028 Windows-Pipes.pptx
029 PE-Files-and-DLLs.pptx
029 Windows Internals - PE Files DLLs
030 Windows Command Line - Accessing the Command Line
031 Windows Command Line - Navigation
032 Windows Command Line - Working with Files and Directories
033 Windows Command Line - Working with Pipes
034 Windows Command Line - Standard IOE
035 Windows Command Line - Managing Windows
external-assets-links.txt
4. The Linux Operating System
036 The-GUI.pptx
036 Where is the GUI
037 The Linux File System
037 The-Linux-File-System.pptx
038 Linux Command Line - Navigation
039 Linux Command Line - Working with Files and Directories
040 Linux Command Line - Standard IOE Recap
041 Linux Command Line - Working with Data
042 Linux Command Line - Working with File Permissions
042 Linux-File-Permissions.pptx
043 Linux Command Line - Man Pages
044 Linux Command Line - Base64
045 Linux Command Line - Hex
046 Linux Command Line - Network Connections Recap
047 Linux Processes
047 Processes.pptx
048 Inodes.pptx
048 What are INodes
049 Open-FIles.pptx
049 Working with Open Files
050 Symbolic Links
050 Symbolic-Links.pptx
051 The IDs
052 Linux Pipes
053 Linux Run Levels
053 Run-Levels.pptx
054 Linux Logs
external-assets-links.txt
5. Operating System Internals
055 The Kernel
055 The-Kernel.pptx
056 One Ring to Rule Them All
056 One-Ring-to-Rule-Them-All.pptx
057 What is a CPU
057 What-is-a-CPU.pptx
058 Registers.pptx
058 The CPU Registers
059 Flags.pptx
059 The CPU Flags
060 Memory.pptx
060 What is Memory How does it work
061 The Stack
061 The-Stack.pptx
062 The Heap
062 The-Heap.pptx
063 Extra information on Memory
063 More-on-Memory.pptx
064 Debugger.pptx
064 Debuggers
065 ASLR.pptx
065 Taking a look at ASLR
066 A Quick Word About AntiVirus
066 AntiVirus.pptx
external-assets-links.txt
6. Active Directory
067 What is Active Directory
067 What-is-Active-Directory.pptx
068 Basic Windows Server Configuration
069 Install AD DS
070 The AD Tree
071 OUs and their Permissions
072 Managing Users and Groups
073 Adding Machine to the Domain
074 Setting up Group Policies
075 Cached Credentials
external-assets-links.txt
7. Kerberos
076 What is Kerberos
076 What-is-Kerberos.pptx
077 Kerberos Realms
077 Kerberos-Realm.pptx
078 The Authentication Server
078 The-Authentication-Sever.pptx
079 The Ticket Granting Server
079 The-Ticket-Granting-Server.pptx
8. Data Manipulation
080 What is Encryption
080 What-is-Encryption.pptx
081 Symmetric Encryption
081 Symmetric-Encryption.pptx
082 Asymmetric Encryption
082 Asymmetric-Encryption.pptx
083 RSA Encryption
083 RSA.pptx
084 AES Encryption
084 AES.pptx
085 What is Hashing
085 What-is-Hashing.pptx
086 MD5 Hashing
086 MD5.pptx
087 SHA Hashing
087 SHA.pptx
088 What is Encoding
088 What-is-Encoding.pptx
089 Base64 Encoding
089 Base64.pptx
090 Hex Encoding
090 Hex.pptx
091 URL Encoding
091 URL.pptx
092 What is Compression
092 What-is-Compression.pptx
093 Lossless vs Lossy Compression
093 Lossless-vs-Lossy.pptx
094 LZ77 LZ78 Compression Algorithms
094 LZ77-and-LZ78.pptx
095 Data Manipulation - Hands On
095 Data-Manipulation-Hands-On.pptx
external-assets-links.txt
9. Networking
096 What is Networking
096 What-is-Networking.pptx
097 OSI-Model.pptx
097 The OSI Model
098 TCPIP
098 TCPIP.pptx
099 UDP
099 UDP.pptx
100 The Switch
100 The-Switch.pptx
101 Routers Gateways
101 Routers-and-Gateways.pptx
102 What is a Protocol
102 What-is-a-Protocol.pptx
103 ICMP
103 ICMP.pptx
104 DNS
104 DNS.pptx
105 DHCP
105 DHCP.pptx
106 ARP
106 ARP.pptx
107 What is an IDS
107 What-is-an-IDS.pptx
108 What is an IPS
108 What-is-an-IPS.pptx
109 What is HA
109 What-is-HA.pptx
110 Proxys
110 Proxys.pptx
111 DMZ.pptx
111 The DMZ
112 Quick Talk on Databases
112 Quick-Talk-on-Databases.pptx
external-assets-links.txt
10. VPN's
113 What is a VPN
113 What-is-a-VPN.pptx
114 What is IPSEC
114 What-is-a-IPSEC.pptx
115 What is IKE
115 What-is-a-IKE.pptx
11. Firewalls
116 What is a Firewall
116 What-is-a-Firewall.pptx
117 Packet Filtering Firewalls
117 Packet-Filtering-Firewalls.pptx
118 Stateful Inspecting Firewalls
118 Stateful-Inspection-Firewalls.pptx
119 Web Application Firewalls
119 Web-Application-Firewalls.pptx
12. Building a Firewall
Redteam Blueprint A Unique Guide To Ethical Hacking Video Training Course & PDF
You can Instant Download a PDF file After successful payment ,
This PDF File Contains Course Download links.
You can Download This Course immediately from click that Links.