ExtraTorrent.st - The Largest Bittorent System
Latest Articles
Most searched
ExtraTorrent.st > Categories > Other torrents


Browse Other torrents

Advanced Pen Testing Techniques for Active Directory torrent


Download torrent: Magnet link
Info hash: 8F2A4843A72C75F7689C995F0BEE00E9ABE1932E
Category: Categories > Other torrents
Trackers:
udp://open.stealth.si:80/announce
udp://tracker.tiny-vps.com:6969/announce
udp://fasttracker.foreverpirates.co:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://explodie.org:6969/announce
udp://tracker.cyberia.is:6969/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://tracker.uw0.xyz:6969/announce
udp://opentracker.i2p.rocks:6969/announce
udp://tracker.birkenwald.de:6969/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.moeking.me:6969/announce
udp://tracker.dler.org:6969/announce
udp://9.rarbg.me:2970/announce
udp://tracker.opentrackr.org:1337/announce
http://tracker.openbittorrent.com:80/announce
udp://opentracker.i2p.rocks:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://coppersurfer.tk:6969/announce
udp://tracker.zer0day.to:1337/announce
Health:
 seeds: 0, leechers: 0
Torrent language: English English
Total Size: 257 MB
Number of files:
91   
Uploader:
tutsnode
Torrent added:2023-08-30 19:32:52

Download Advanced Pen Testing Techniques for Active Directory torrent




Torrent Description
Description

As a security professional, one of your most important jobs is to make sure that only authorized users have access to your system. Most often, this is achieved via credential-based access control, where credentials are stored in central directories like Microsoft Active Directory (AD). But are you really ready to handle an unexpected cyberattack?

In this course, instructor Malcolm Shore gives you an overview of Active Directory, including how to enumerate it and validate its security with penetration testing. Explore the core concepts of penetration testing and why it’s so important for enterprise security management. Learn how AD interacts with identity providers and how you interact with it at the command line using LDAP protocol as well as through Powerpoint. Malcolm teaches you some key tricks and gives you examples of how to get the most out of your audits by understanding and utilizing spray attacks, hash extractions, impacket libraries, and brute force attacks.

Last Updated 1/2021

Download Advanced Pen Testing Techniques for Active Directory torrent


Related Torrents

Added  Size  Health
Download Magnet link   Udemy - Advanced Web Hacking : Industry Standard Pen-Test & Report in Other , by
tutsgalaxy
5y 943.8 MB 23 4




Home - Browse Torrents
ExtraTorrent.st is in compliance with copyrights
2025 ExtraTorrent.st