6.6.6 Analyze a DHCP Spoofing On-Path Attack
we r smart
6.6.6 Analyze a DHCP Spoofing On-Path Attack
8:37
2.5.5 Analyze Passwords using Rainbow Tables
we r smart
2.5.5 Analyze Passwords using Rainbow Tables
6:25
6.3.11 Hijack a Web Session (TestOut Lab), only for learning purpose.
we r smart
6.3.11 Hijack a Web Session (TestOut Lab), only for learning purpose.
5:01
3.4.10 Create a Honeypot with Pentbox (TestOut Lab)
we r smart
3.4.10 Create a Honeypot with Pentbox (TestOut Lab)
4:17
2.3.4 Implement Physical Security Countermeasures (TestOut Lab)
we r smart
2.3.4 Implement Physical Security Countermeasures (TestOut Lab)
1:43
2.4.10 Configure Security Appliance Access (TestOut Lab)
we r smart
2.4.10 Configure Security Appliance Access (TestOut Lab)
5:29
2.5.7 Manage Certificates (TestOut Lab)
we r smart
2.5.7 Manage Certificates (TestOut Lab)
4:06
2.4.6 Configure a Captive Portal (TestOut Lab)
we r smart
2.4.6 Configure a Captive Portal (TestOut Lab)
4:53
2.4.8 Secure a Mobile Device (TestOut Lab)
we r smart
2.4.8 Secure a Mobile Device (TestOut Lab)
2:51
2.5.6 Configure Account Password Policies
we r smart
2.5.6 Configure Account Password Policies
3:08
2.4.9 Configure a Security Appliance (TestOut Lab)
we r smart
2.4.9 Configure a Security Appliance (TestOut Lab)
4:34
2.4.7 Discover Bluetooth Devices (TestOut Lab)
we r smart
2.4.7 Discover Bluetooth Devices (TestOut Lab)
7:18
8.3.11 Analyze FTP Credentials with Wireshark
we r smart
8.3.11 Analyze FTP Credentials with Wireshark
2:17
8.3.11 Analyze FTP Credentials with Wireshark (TestOut Lab)
we r smart
8.3.11 Analyze FTP Credentials with Wireshark (TestOut Lab)
3:33
8.1.6 Evaluate Network Security with Hunter 1 (TestOut Lab)
we r smart
8.1.6 Evaluate Network Security with Hunter 1 (TestOut Lab)
3:50
8.1.5 Evaluate Network Security with Kibana (TestOut Lab)
we r smart
8.1.5 Evaluate Network Security with Kibana (TestOut Lab)
2:26
8.1.7 Evaluate Network Security with Hunter 2 (TestOut Lab)
we r smart
8.1.7 Evaluate Network Security with Hunter 2 (TestOut Lab)
7:31
7.5.10 Identify Social Engineering (TestOut Lab)
we r smart
7.5.10 Identify Social Engineering (TestOut Lab)
4:47
7.3.6 Configure URL Blocking (TestOut Lab)
we r smart
7.3.6 Configure URL Blocking (TestOut Lab)
8:11
7.3.3 Counter Malware with Windows Defender (TestOut Lab)
we r smart
7.3.3 Counter Malware with Windows Defender (TestOut Lab)
2:50
7.3.4 Configure Windows Defender Application Control (TestOut Lab)
we r smart
7.3.4 Configure Windows Defender Application Control (TestOut Lab)
8:40
7.2.6 Scan for Zombie Processes (TestOut Lab)
we r smart
7.2.6 Scan for Zombie Processes (TestOut Lab)
2:17
7.2.14 Enforce User Account Control (TestOut Lab)
we r smart
7.2.14 Enforce User Account Control (TestOut Lab)
4:42
7.1.16 Compare an MD5 Hash (TestOut Lab), only for learning purpose.
we r smart
7.1.16 Compare an MD5 Hash (TestOut Lab), only for learning purpose.
3:16
7.1.17 Examine a Forensic Drive Image (TestOut Lab)
we r smart
7.1.17 Examine a Forensic Drive Image (TestOut Lab)
10:19
7.1.15 Encrypt a Hard Drive (TestOut Lab), only for learning purpose.
we r smart
7.1.15 Encrypt a Hard Drive (TestOut Lab), only for learning purpose.
4:26
7.1.4 Create a Remote Access Policy (TestOut Lab), only for learning purpose.
we r smart
7.1.4 Create a Remote Access Policy (TestOut Lab), only for learning purpose.
6:41
6.9.12 Analyze a DDoS Attack (TestOut Lab), only for learning purpose.
we r smart
6.9.12 Analyze a DDoS Attack (TestOut Lab), only for learning purpose.
1:56
6.9.11 Analyze a DoS Attack (TestOut Lab), only for learning purpose.
we r smart
6.9.11 Analyze a DoS Attack (TestOut Lab), only for learning purpose.
3:55
6.9.10 Analyze ICMP Traffic in Wireshark (TestOut Lab), only for learning purpose.
we r smart
6.9.10 Analyze ICMP Traffic in Wireshark (TestOut Lab), only for learning purpose.
4:40
6.8.5 Analyze Email Traffic for Sensitive Data (TestOut Lab), only for learning purpose.
we r smart
6.8.5 Analyze Email Traffic for Sensitive Data (TestOut Lab), only for learning purpose.
7:06
6.6.6 Analyze a DHCP Spoofing On Path Attack (TestOut Lab), only for learning purpose.
we r smart
6.6.6 Analyze a DHCP Spoofing On Path Attack (TestOut Lab), only for learning purpose.
9:31
6.6.7 Analyze HTTP POST Packets with Wireshark (TestOut Lab), only for learning purpose.
we r smart
6.6.7 Analyze HTTP POST Packets with Wireshark (TestOut Lab), only for learning purpose.
2:15
6.5.9 Analyze ARP Poisoning with Wireshark (TestOut Lab), only for learning purpose.
we r smart
6.5.9 Analyze ARP Poisoning with Wireshark (TestOut Lab), only for learning purpose.
2:26
6.5.11 Filter and Analyze Traffic with Wireshark (TestOut Lab), only for learning purpose.
we r smart
6.5.11 Filter and Analyze Traffic with Wireshark (TestOut Lab), only for learning purpose.
10:16
6.8.4 Analyze Email Traffic for Spoofed Addresses (TestOut Lab), only for learning purpose.
we r smart
6.8.4 Analyze Email Traffic for Spoofed Addresses (TestOut Lab), only for learning purpose.
4:16
6.5.10 Analyze DNS Spoofing (TestOut Lab), only for learning purpose.
we r smart
6.5.10 Analyze DNS Spoofing (TestOut Lab), only for learning purpose.
4:59
6.4.9 Detect SQL Injection Flaws with Burp Suite (TestOut Lab), only for learning purpose.
we r smart
6.4.9 Detect SQL Injection Flaws with Burp Suite (TestOut Lab), only for learning purpose.
5:40
6.4.8 Explore SQL Injection Flaws (TestOut Lab), only for learning purpose.
we r smart
6.4.8 Explore SQL Injection Flaws (TestOut Lab), only for learning purpose.
5:12
6.1.14 Perform a Decoy Scan (TestOut Lab), only for learning purpose.
we r smart
6.1.14 Perform a Decoy Scan (TestOut Lab), only for learning purpose.
1:36
6.2.7 Discover a Rogue DHCP Server (TestOut Lab), only for learning purpose.
we r smart
6.2.7 Discover a Rogue DHCP Server (TestOut Lab), only for learning purpose.
2:59
6.1.13 Configure a Perimeter Firewall (TestOut Lab), only for learning purpose.
we r smart
6.1.13 Configure a Perimeter Firewall (TestOut Lab), only for learning purpose.
5:51
6.2.5 Scan for Open Ports from a Remote Computer (TestOut Lab), only for learning purpose.
we r smart
6.2.5 Scan for Open Ports from a Remote Computer (TestOut Lab), only for learning purpose.
4:34
6.3.4 Evaluate Webserver Security (TestOut Lab), only for learning purpose.
we r smart
6.3.4 Evaluate Webserver Security (TestOut Lab), only for learning purpose.
6:18
6.2.8 Locate a Rogue Wireless Access Point (TestOut Lab), only for learning purpose.
we r smart
6.2.8 Locate a Rogue Wireless Access Point (TestOut Lab), only for learning purpose.
3:39
6.2.6 Discover a Hidden Network (TestOut Lab), only for learning purpose.
we r smart
6.2.6 Discover a Hidden Network (TestOut Lab), only for learning purpose.
4:54
6.1.12 Implement Intrusion Prevention with pfSense (TestOut Lab), only for learning purpose.
we r smart
6.1.12 Implement Intrusion Prevention with pfSense (TestOut Lab), only for learning purpose.
6:52
6.1.11 Prevent Zone Transfer (TestOut Lab), only for learning purpose.
we r smart
6.1.11 Prevent Zone Transfer (TestOut Lab), only for learning purpose.
0:52
5.4.15 Test the Security of a Web Application 1 (TestOut Lab),  only for learning purpose.
we r smart
5.4.15 Test the Security of a Web Application 1 (TestOut Lab), only for learning purpose.
4:41
5.4.16 Test the Security of a Web Application 2 (TestOut Lab), only for learning purpose.
we r smart
5.4.16 Test the Security of a Web Application 2 (TestOut Lab), only for learning purpose.
4:19
5.4.13 Scan for Vulnerabilities on a Linux Server 9TestOut Lab), only for learning purpose.
we r smart
5.4.13 Scan for Vulnerabilities on a Linux Server 9TestOut Lab), only for learning purpose.
3:32
5.4.12 Scan for Vulnerabilities on a Windows Workstation (TestOut Lab)
we r smart
5.4.12 Scan for Vulnerabilities on a Windows Workstation (TestOut Lab)
7:47
5.3.11 Perform Enumeration with Metasploit (TestOut Lab), only for learning purpose.
we r smart
5.3.11 Perform Enumeration with Metasploit (TestOut Lab), only for learning purpose.
3:10
5.3.12 Perform Enumeration of MSSQL with Metasploit (TestOut Lab)
we r smart
5.3.12 Perform Enumeration of MSSQL with Metasploit (TestOut Lab)
2:58
5.3.10 Perform Enumeration with Nmap (TestOut Lab)
we r smart
5.3.10 Perform Enumeration with Nmap (TestOut Lab)
6:43
5.2.15 Troubleshoot Connectivity with Ping/hping3 (TestOut Lab) Learning purpose only.
we r smart
5.2.15 Troubleshoot Connectivity with Ping/hping3 (TestOut Lab) Learning purpose only.
8:53
5.2.10 Perform an External Scan Using Zenmap (TestOut Lab), and only for learning purpose.
we r smart
5.2.10 Perform an External Scan Using Zenmap (TestOut Lab), and only for learning purpose.
2:14
5.2.12 View Open Ports with Netstat (TestOut Lab), and only for learning purpose.
we r smart
5.2.12 View Open Ports with Netstat (TestOut Lab), and only for learning purpose.
5:26
5.1.10 Perform an Internal Scan with Nmap (TestOut Lab), only for learning purpose.
we r smart
5.1.10 Perform an Internal Scan with Nmap (TestOut Lab), only for learning purpose.
1:48
5.2.11 Detect Open Ports with Nmap (TestOut Lab)
we r smart
5.2.11 Detect Open Ports with Nmap (TestOut Lab)
3:05
5.1.17 Hide the IIS Banner Broadcast (TestOut Lab)
we r smart
5.1.17 Hide the IIS Banner Broadcast (TestOut Lab)
0:48
5.1.12 Extra Web Server Information with Nmap (TestOut Lab)
we r smart
5.1.12 Extra Web Server Information with Nmap (TestOut Lab)
11:25
5.2.13 Bypass Windows Firewall with Nmap (TestOut Lab)
we r smart
5.2.13 Bypass Windows Firewall with Nmap (TestOut Lab)
1:30
5.2.14 Scan for Vulnerabilities on IoT (TestOut Lab)
we r smart
5.2.14 Scan for Vulnerabilities on IoT (TestOut Lab)
2:39
5.1.5 perform reconnaissance with Nmap (TestOut lab)
we r smart
5.1.5 perform reconnaissance with Nmap (TestOut lab)
4:18
5.1.15 Analyze a SYN Flood Attack (TestOut Lab)
we r smart
5.1.15 Analyze a SYN Flood Attack (TestOut Lab)
5:19
4.1.7 Disable Windows Service (TestOut lab)
we r smart
4.1.7 Disable Windows Service (TestOut lab)
4:24
4.1.5 Manage Linux Service (TestOut lab)
we r smart
4.1.5 Manage Linux Service (TestOut lab)
4:17
4.1.8 View Process Information (TestOut lab)
we r smart
4.1.8 View Process Information (TestOut lab)
3:04
4.5.9 Log Event With PfSense (TestOut lab)
we r smart
4.5.9 Log Event With PfSense (TestOut lab)
4:44
4.5.11 Evaluate Windows Log File (TestOut lab)
we r smart
4.5.11 Evaluate Windows Log File (TestOut lab)
8:18
4.5.10 Evaluate Event Logs in PfSense (TestOut lab)
we r smart
4.5.10 Evaluate Event Logs in PfSense (TestOut lab)
5:58
4.1.6 Enable and Disable Bluetooth Service (TestOut lab)
we r smart
4.1.6 Enable and Disable Bluetooth Service (TestOut lab)
2:26