| | WATCHED | 1 - welcome | | | |
| | | 2 - System requirements | | | |
| | | 3 - What This Course Will Cover | | | |
| | | 4 - Prerequisites | | | |
| | | 5 - Acquiring Dradis | | | |
| | | 6 - Installing Dradis | | | |
| | | 7 - Using Dradis | | | |
| | | 8 - Adding Notes | | | |
| | | 9 - Categorizing Information | | | |
| | | 10 - Review of Scan Types | | | |
| | | 11 - Advanced Scanning | | | |
| | | 12 - Scripting Engine | | | |
| | | 13 - Investigating Scan Types with Wireshark | | | |
| | | 14 - Importing Results to Dradis | | | |
| | | 15 - Aquiring Nessus | | | |
| | | 16 - Setting Up Nessus | | | |
| | | 17 - Configuring Nessus | | | |
| | | 18 - Scan Details Network | | | |
| | | 19 - Scan Details Credentials Plugins Option | | | |
| | | 20 - Scan Details Web Applications | | | |
| | | 21 - Starting Scan | | | |
| | | 22 - Reviewing Results
| | | |
| | | 23 - False Positives
| | | |
| | | 24 - Setting Up Jobs
| | | |
| | | 25 - Acquiring Nexpose
| | | |
| | | 26 - Setting Up Nexpose
| | | |
| | | 27 - Configuring Nexpose
| | | |
| | | 28 - Adding Hosts to Nexpose
| | | |
| | | 29 - Reviewing Results & Manual Checks
| | | |
| | | 30 - Netcat
| | | |
| | | 31 - Protocol Checking
| | | |
| | | 32 - SSL Client
| | | |
| | | 33 - SSLScan
| | | |
| | | 34 - Snmpwalk
| | | |
| | | 35 - Acquiring Metasploit
| | | |
| | | 36 - Setting Up Metasploit
| | | |
| | | 37 - Metasploit Web Interface
| | | |
| | | 38 - Configuring Workspaces
| | | |
| | | 39 - Running Nmap from metasploit
| | | |
| | | 40 - Import Nessus Results
| | | |
| | | 41 - Scanning with Metasploit
| | | |
| | | 42 - Looking at Vulnerabilities
| | | |
| | | 43 - Searching Vulnerabilites
| | | |
| | | 44 - Running Exploits
| | | |
| | | 45 - Post Exploitation Data Gathering
| | | |
| | | 46 - Pivoting & Tunneling
| | | |
| | | 47 - Writing an MSF Plugin
| | | |
| | | 48 - Writing Fuzzers
| | | |
| | | 49 - Social Engineering Toolkit
| | | |
| | | 50 - Spear Phishing
| | | |
| | | 51 - Browser Plugins with Chrome
| | | |
| | | 52 - Browser Plugins with Firefox
| | | |
| | | 53 - Tamperdata
| | | |
| | | 54 - Performing Injections
| | | |
| | | 55 - Cookie Data with Tamperdata
| | | |
| | | 56 - SQL Inject Me
| | | |
| | | 57 - XSS Me
| | | |
| | | 58 - Firebug
| | | |
| | | 59 - Hackbar
| | | |
| | | 60 - Wappalyzer
| | | |
| | | 61 - Passive Recon
| | | |
| | | 63 - Acquiring Webgoat
| | | |
| | | 64 - Practicing Web Application Attacks
| | | |
| | | 62 - Groundspeed
| | | |
| | | 65 - Basics of Webgoat
| | | |
| | | 66 - Working Through Lessons
| | | |
| | | 67 - Acquiring Burpsuite
| | | |
| | | 68 - Installing Burpsuite
| | | |
| | | 69 - Running Burpsuite & Configuring Your Browser
| | | |
| | | 70 - Spidering
| | | |
| | | 71 - Passive Scanning
| | | |
| | | 72 - Active Scanning
| | | |
| | | 73 - Investigating Results
| | | |
| | | 74 - Password Attacks
| | | |
| | | 75 - Fuzzing Attacks
| | | |
| | | 76 - Doing Sequencing
| | | |
| | | 77 - Using the Intruder
| | | |
| | | 78 - Acquiring W3Af
| | | |
| | | 79 - Installing W3Af
| | | |
| | | 80 - Running W3Af
| | | |
| | | 81 - Configuring W3Af
| | | |
| | | 82 - Acquiring & Configuring Zed Attack Proxy ZAP
| | | |
| | | 83 - Quick Start with ZAP
| | | |
| | | 84 - Scanning with ZAP
| | | |
| | | 85 - Spidering with ZAP
| | | |
| | | 86 - Fuzzing with ZAP
| | | |
| | | 87 - Web Architecture
| | | |
| | | 88 - Basics of SQL Injection
| | | |
| | | 89 - Manual Testing
| | | |
| | | 90 - SQLMap
| | | |
| | WATCHED | 91 - Command Injection
| | | |
| | | 92 - Cross Site Scripting
| | | |
| | | 93 - Spear Phishing
| | | |
| | | 94 - Cross Site Request Forgery
| | | |
| | | 95 - Roque Servers
| | | |
| | | 96 - Spoofed Certificates
| | | |
| | | 97 - Course Wrap up
| | | |
| | | 98 - Next Steps
|