itsMe Posted July 16, 2023 Share Posted July 16, 2023 This is the hidden content, please Sign In or Sign Up About Course SecureNinja’s Red Team Hacking will teach you the skills, techniques and proven methodology of how to setup and be a Red Team Member. Red Team Hacking by name infers that it is 100% offensive, and that is just what you will learn during this comprehensive and fun-filled course which will show you how to break into and exploit systems. Introduction (2:01) Module 1 Overview of Ethical Hacking Pt 1 (13:25) Module 1 Overview of Ethical Hacking Pt 2 (8:02) Module 1 LAB 1 Hacking Toolkit (15:32) Module 1 Quiz Module 2 Executing the Hacking Methodology Pt 1 (10:55) Module 2 LAB 1 Surveillance Techniques (10:56) Module 2 Executing the Hacking Methodology Pt 2 (0:48) Module 2 DEMO 1 Wayback Machine, Shodan, Diggity (5:54) Module 2 Executing the Hacking Methodology Pt 3 (3:40) Module 2 DEMO 2 OSVDB, Exploit-db (3:15) Module 2 Executing the Hacking Methodology Pt 4 (3:50) Module 2 LAB 2 Scanning Techniques (6:27) Module 2 Executing the Hacking Methodology Pt 5 (0:57) Module 2 DEMO 3 Netcat (9:36) Module 2 Quiz Module 3 Attacking Devices Pt 1 (9:44) Module 3 DEMO 1 Searching the Internet for Vulnerabilities (3:17) Module 3 Attacking Devices Pt 2 (15:49) Module 3 LAB 1 Device Attacks (26:01) Module 3 Attacking Devices Pt 3 (1:07) Module 3 Quiz Module 4 Designing Attacks Against Servers Pt 1 (22:28) Module 4 DEMO 1 John The Ripper (3:35) Module 4 Designing Attacks Against Servers Pt 2 (3:35) Module 4 LAB 1 Server Attacks (31:17) Module 4 Designing Attacks Against Servers Pt 3 (10:40) Module 4 DEMO 2 Alternate Data Streams (8:35) Module 4 Designing Attacks Against Servers Pt 4 (7:29) Module 4 LAB 2 Information Hiding (10:56) Module 4 Designing Attacks Against Servers Pt 5 (2:59) Module 4 Quiz Module 5 Attacking Services Pt 1 (7:34) Module 5 DEMO 1 SYN Flooding (8:54) Module 5 Attacking Services Pt 2 (21:11) Module 5 LAB 1 Attacking Services (19:01) Module 5 Attacking Services Pt 3 (0:38) Module 5 Quiz Module 6 Attacking Clients Pt 1 (16:06) Module 6 LAB 1 Attacking Clients (14:20) Module 6 Attacking Clients Pt 2 (0:48) Module 6 Quiz Module 7 Web Application Hacking Pt 1 (6:32) Module 7 LAB 1 Attacking Web Apps (22:46) Module 7 Web Application Hacking Pt 2 (0:33) Module 7 Quiz Module 8 Hacking Wireless Pt 1 (11:52) Module 8 LAB 1 Attacking Wireless (16:29) Module 8 Hacking Wireless Pt 2 (0:41) Module 8 Quiz Module 9 Mobile Device Hacking (2:59) Module 9 Quiz Module 10 Advanced Hacks (5:32) Module 10 Quiz Module 11 Building a Range (22:41) Module 11 DEMO 1 Building a Range (3:22) Module 11 Quiz Module 12 Additional Considerations Pt 1 (5:14) Module 12 DEMO 1 Additional Considerations (10:15) Module 12 Additional Considerations Pt 2 (0:29) Module 12 Quiz Module 13 Next Steps (3:10) This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up Link to comment Share on other sites More sharing options...
Recommended Posts