Pluralsight - Post-exploitation and Lateral Movements for CompTIA Pentest+

dkmdkm

U P L O A D E R
dbb0933f611279389bb3fa55a5d4ef54.avif

Free Download Pluralsight - Post-exploitation and Lateral Movements for CompTIA Pentest+
Published: 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 48 KHz
Language: English | Size: 526.57 MB | Duration: 1h 28m 10s
This course teaches you how to establish persistence, execute lateral movements, exfiltrate data, and perform cleanup operations, preparing you for the CompTIA PenTest+ exam.

Post-exploitation techniques are critical for maintaining access, moving laterally, and extracting data in a controlled and ethical penetration testing engagement. In this course, Post-exploitation and Lateral Movements for CompTIA PenTest+, you'll gain the skills required to effectively navigate compromised environments.
First, you'll learn how to establish and maintain persistence using scheduled tasks, command-and-control frameworks, and rootkits. Next, you'll explore lateral movement techniques, such as pivoting, service enumeration, and credential dumping, using tools like Mimikatz and Impacket. Finally, you'll cover staging and exfiltration methods, as well as cleanup and restoration activities to revert changes and preserve evidence.
By the end of this course, you'll have the knowledge to execute post-exploitation techniques responsibly and effectively, fully preparing you for the CompTIA PenTest+ certification exam.
Homepage:
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!

Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
No Password - Links are Interchangeable
 
Kommentar
537661809_oip.jpg

525.98 MB | 00:05:16 | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English


Files Included :
1 -Scheduled Tasks, Cron Jobs, and Service Creation.mp4 (58.27 MB)
2 -Reverse Shells.mp4 (31.05 MB)
3 -Bind Shells.mp4 (2.95 MB)
4 -Advanced Tools for Shells.mp4 (38.23 MB)
5 -Adding Accounts and Using C2 Frameworks.mp4 (17.29 MB)
6 -Backdoors and Rootkits.mp4 (27.95 MB)
7 -Browser Extensions and Security Controls.mp4 (8.94 MB)
10 -Enumeration.mp4 (21 MB)
11 -Windows Management Instrumentation (WMI).mp4 (25.27 MB)
12 -Other Lateral Movement Tools.mp4 (20.57 MB)
8 -Moving Laterally.mp4 (34.91 MB)
9 -Demo SShuttle.mp4 (6.4 MB)
13 -File Encryption and Compression.mp4 (37.81 MB)
14 -Covert Channels and Email.mp4 (24.16 MB)
15 -Cloud Vectors.mp4 (28.97 MB)
16 -File-based Exfiltration Vectors.mp4 (36.9 MB)
17 -Remove Persistence Mechanisms.mp4 (31.74 MB)
18 -Configuration Changes.mp4 (19.7 MB)
19 -Closing the Loop Cleanup, Documentation, and Data Security.mp4 (37.53 MB)
]
Screenshot
UDBgsBuB_o.jpg



Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten