Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Hands-on Penetration Testing Labs 4.0
Training Overview
Description of Training
Video Overview (2:19)
Section 1: Introduction
1. Introduction (2:19)
2. Download and Configure Kali Linux 2020 (2:58)
3. Download and Config Vulnerable Attack Target VMs (2:00)
4. Tr0ll 3 Enumeration and Exploitation (25:33)
5. Matrix 3 Enumeration and Exploitation (30:12)
6. Broken Gallery Enumeration and Exploitation (15:28)
7. DumbUser (Windows 10) Enumeration and Exploitation (19:58)
8. Symfonos 1 Enumeration and Exploitation (23:01)
9. Symfonos 2 Enumeration and Exploitation (18:41)
10. Symfonos 3 Enumeration and Exploitation (12:30)
11. Symfonos 4 Enumeration and Exploitation (24:17)
12. Symfonos 5 Enumeration and Exploitation (14:10)
13. digialworld.local JOY Enumeration and Exploitation (17:35)
14. digitalworld.local Torment Enumeration and Exploitation (21:10)
3. Download and Config Vulnerable Attack Target VMs
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock