we r smart
6.6.6 Analyze a DHCP Spoofing On-Path Attack
8:37
we r smart
2.5.5 Analyze Passwords using Rainbow Tables
6:25
we r smart
6.3.11 Hijack a Web Session (TestOut Lab), only for learning purpose.
5:01
we r smart
3.4.10 Create a Honeypot with Pentbox (TestOut Lab)
4:17
we r smart
2.3.4 Implement Physical Security Countermeasures (TestOut Lab)
1:43
we r smart
2.4.10 Configure Security Appliance Access (TestOut Lab)
5:29
we r smart
2.5.7 Manage Certificates (TestOut Lab)
4:06
we r smart
2.4.6 Configure a Captive Portal (TestOut Lab)
4:53
we r smart
2.4.8 Secure a Mobile Device (TestOut Lab)
2:51
we r smart
2.5.6 Configure Account Password Policies
3:08
we r smart
2.4.9 Configure a Security Appliance (TestOut Lab)
4:34
we r smart
2.4.7 Discover Bluetooth Devices (TestOut Lab)
7:18
we r smart
8.3.11 Analyze FTP Credentials with Wireshark
2:17
we r smart
8.3.11 Analyze FTP Credentials with Wireshark (TestOut Lab)
3:33
we r smart
8.1.6 Evaluate Network Security with Hunter 1 (TestOut Lab)
3:50
we r smart
8.1.5 Evaluate Network Security with Kibana (TestOut Lab)
2:26
we r smart
8.1.7 Evaluate Network Security with Hunter 2 (TestOut Lab)
7:31
we r smart
7.5.10 Identify Social Engineering (TestOut Lab)
4:47
we r smart
7.3.6 Configure URL Blocking (TestOut Lab)
8:11
we r smart
7.3.3 Counter Malware with Windows Defender (TestOut Lab)
2:50
we r smart
7.3.4 Configure Windows Defender Application Control (TestOut Lab)
8:40
we r smart
7.2.6 Scan for Zombie Processes (TestOut Lab)
2:17
we r smart
7.2.14 Enforce User Account Control (TestOut Lab)
4:42
we r smart
7.1.16 Compare an MD5 Hash (TestOut Lab), only for learning purpose.
3:16
we r smart
7.1.17 Examine a Forensic Drive Image (TestOut Lab)
10:19
we r smart
7.1.15 Encrypt a Hard Drive (TestOut Lab), only for learning purpose.
4:26
we r smart
7.1.4 Create a Remote Access Policy (TestOut Lab), only for learning purpose.
6:41
we r smart
6.9.12 Analyze a DDoS Attack (TestOut Lab), only for learning purpose.
1:56
we r smart
6.9.11 Analyze a DoS Attack (TestOut Lab), only for learning purpose.
3:55
we r smart
6.9.10 Analyze ICMP Traffic in Wireshark (TestOut Lab), only for learning purpose.
4:40
we r smart
6.8.5 Analyze Email Traffic for Sensitive Data (TestOut Lab), only for learning purpose.
7:06
we r smart
6.6.6 Analyze a DHCP Spoofing On Path Attack (TestOut Lab), only for learning purpose.
9:31
we r smart
6.6.7 Analyze HTTP POST Packets with Wireshark (TestOut Lab), only for learning purpose.
2:15
we r smart
6.5.9 Analyze ARP Poisoning with Wireshark (TestOut Lab), only for learning purpose.
2:26
we r smart
6.5.11 Filter and Analyze Traffic with Wireshark (TestOut Lab), only for learning purpose.
10:16
we r smart
6.8.4 Analyze Email Traffic for Spoofed Addresses (TestOut Lab), only for learning purpose.
4:16
we r smart
6.5.10 Analyze DNS Spoofing (TestOut Lab), only for learning purpose.
4:59
we r smart
6.4.9 Detect SQL Injection Flaws with Burp Suite (TestOut Lab), only for learning purpose.
5:40
we r smart
6.4.8 Explore SQL Injection Flaws (TestOut Lab), only for learning purpose.
5:12
we r smart
6.1.14 Perform a Decoy Scan (TestOut Lab), only for learning purpose.
1:36
we r smart
6.2.7 Discover a Rogue DHCP Server (TestOut Lab), only for learning purpose.
2:59
we r smart
6.1.13 Configure a Perimeter Firewall (TestOut Lab), only for learning purpose.
5:51
we r smart
6.2.5 Scan for Open Ports from a Remote Computer (TestOut Lab), only for learning purpose.
4:34
we r smart
6.3.4 Evaluate Webserver Security (TestOut Lab), only for learning purpose.
6:18
we r smart
6.2.8 Locate a Rogue Wireless Access Point (TestOut Lab), only for learning purpose.
3:39
we r smart
6.2.6 Discover a Hidden Network (TestOut Lab), only for learning purpose.
4:54
we r smart
6.1.12 Implement Intrusion Prevention with pfSense (TestOut Lab), only for learning purpose.
6:52
we r smart
6.1.11 Prevent Zone Transfer (TestOut Lab), only for learning purpose.
0:52
we r smart
5.4.15 Test the Security of a Web Application 1 (TestOut Lab), only for learning purpose.
4:41
we r smart
5.4.16 Test the Security of a Web Application 2 (TestOut Lab), only for learning purpose.
4:19
we r smart
5.4.13 Scan for Vulnerabilities on a Linux Server 9TestOut Lab), only for learning purpose.
3:32
we r smart
5.4.12 Scan for Vulnerabilities on a Windows Workstation (TestOut Lab)
7:47
we r smart
5.3.11 Perform Enumeration with Metasploit (TestOut Lab), only for learning purpose.
3:10
we r smart
5.3.12 Perform Enumeration of MSSQL with Metasploit (TestOut Lab)
2:58
we r smart
5.3.10 Perform Enumeration with Nmap (TestOut Lab)
6:43
we r smart
5.2.15 Troubleshoot Connectivity with Ping/hping3 (TestOut Lab) Learning purpose only.
8:53
we r smart
5.2.10 Perform an External Scan Using Zenmap (TestOut Lab), and only for learning purpose.
2:14
we r smart
5.2.12 View Open Ports with Netstat (TestOut Lab), and only for learning purpose.
5:26
we r smart
5.1.10 Perform an Internal Scan with Nmap (TestOut Lab), only for learning purpose.
1:48
we r smart
5.2.11 Detect Open Ports with Nmap (TestOut Lab)
3:05
we r smart
5.1.17 Hide the IIS Banner Broadcast (TestOut Lab)
0:48
we r smart
5.1.12 Extra Web Server Information with Nmap (TestOut Lab)
11:25
we r smart
5.2.13 Bypass Windows Firewall with Nmap (TestOut Lab)
1:30
we r smart
5.2.14 Scan for Vulnerabilities on IoT (TestOut Lab)
2:39
we r smart
5.1.5 perform reconnaissance with Nmap (TestOut lab)
4:18
we r smart
5.1.15 Analyze a SYN Flood Attack (TestOut Lab)
5:19
we r smart
4.1.7 Disable Windows Service (TestOut lab)
4:24
we r smart
4.1.5 Manage Linux Service (TestOut lab)
4:17
we r smart
4.1.8 View Process Information (TestOut lab)
3:04
we r smart
4.5.9 Log Event With PfSense (TestOut lab)
4:44
we r smart
4.5.11 Evaluate Windows Log File (TestOut lab)
8:18
we r smart
4.5.10 Evaluate Event Logs in PfSense (TestOut lab)
5:58
we r smart
4.1.6 Enable and Disable Bluetooth Service (TestOut lab)
2:26