种子简介
			
			
				种子名称:
				Pluralsight - Introduction to Penetration Testing Using Metasploit
				文件类型:
				视频
				文件数目:
				32个文件 
				文件大小:
				423.88 MB
				收录时间:
				2016-9-1 19:44
				已经下载:
				3次
				资源热度:
				224
 
				最近下载:
				2025-10-30 03:59
			
			
				
下载BT种子文件
			
			
				
下载Torrent文件(.torrent)
				
立即下载
			
			
			
				
磁力链接下载
			
			
				
magnet:?xt=urn:btih:a608f8c681e22e81cb0664c81699f0c3e9a345e2&dn=Pluralsight - Introduction to Penetration Testing Using Metasploit 
                复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
			
			
		
			
				
喜欢这个种子的人也喜欢
			
			
			
			
			
				
种子包含的文件
			
			
				
					
Pluralsight - Introduction to Penetration Testing Using Metasploit.torrent
				 
                
                
				001 - Course Overview - Course Overview.mp45.86MB
002 - Introducing Metasploit for White Hat Penetration Testing - Introduction and Overview.mp47.94MB
003 - Introducing Metasploit for White Hat Penetration Testing - Ethics and Codes of Conduct.mp47.71MB
004 - Introducing Metasploit for White Hat Penetration Testing - The Penetration Testing Process.mp47.15MB
005 - Introducing Metasploit for White Hat Penetration Testing - Metasploit Framework Components.mp48.84MB
006 - Introducing Metasploit for White Hat Penetration Testing - Course Guidance and Module Summary.mp45.57MB
007 - Installing and Configuring Metasploit - Overview.mp42.11MB
008 - Installing and Configuring Metasploit - Methods of Using Metasploit.mp47.8MB
009 - Installing and Configuring Metasploit - Installing Kali Linux.mp419.93MB
010 - Installing and Configuring Metasploit - Configuring Kali Linux.mp440.47MB
011 - Installing and Configuring Metasploit - NMAP and OpenVAS.mp423.56MB
012 - Installing and Configuring Metasploit - Summary.mp41.45MB
013 - Scanning the Network - Overview.mp41.87MB
014 - Scanning the Network - Scanning Objectives.mp419.82MB
015 - Scanning the Network - Metasploit Scanning.mp419.61MB
016 - Scanning the Network - NMAP Scanning.mp429.63MB
017 - Scanning the Network - OpenVAS Scanning.mp428.45MB
018 - Scanning the Network - Vulnerability Analysis.mp410.39MB
019 - Scanning the Network - Summary.mp41.68MB
020 - Gaining Access to Systems - Overview.mp42.45MB
021 - Gaining Access to Systems - The Process of Exploitation.mp419.53MB
022 - Gaining Access to Systems - Exploits.mp412.23MB
023 - Gaining Access to Systems - Payloads.mp49.96MB
024 - Gaining Access to Systems - Meterpreter.mp416.7MB
025 - Gaining Access to Systems - Exploiting the System.mp428.74MB
026 - Gaining Access to Systems - Post-exploitation Operations with Meterpreter.mp447.01MB
027 - Gaining Access to Systems - Summary.mp43.22MB
028 - Maintaining and Expanding Metasploit - Overview.mp42.18MB
029 - Maintaining and Expanding Metasploit - Metasploit Framework Releases.mp49.63MB
030 - Maintaining and Expanding Metasploit - Expanding Capabilities.mp412.96MB
031 - Maintaining and Expanding Metasploit - Community Resources.mp46.54MB
032 - Maintaining and Expanding Metasploit - Summary.mp42.91MB