Главная
Study mode:
on
1
- Introduction/whoami
2
- A Day in the Life of an Ethical Hacker
3
- Effective Notekeeping
4
- Important Tools
5
- Networking Refresher: Introduction
6
- IP Addresses
7
- MAC Addresses
8
- TCP, UDP, & the Three-Way Handshake
9
- Common Ports & Protocols
10
- The OSI Model
11
- Subnetting
12
- Installing VMWare / VirtualBox
13
- Installing Kali Linux
14
- Configuring VirtualBox
15
- Kali Linux Overview
16
- Sudo Overview
17
- Navigating the File System
18
- Users & Privileges
19
- Common Network Commands
20
- Network Commands Update
21
- Installing & Updating Tools
22
- Installing gedit
23
- Viewing, Creating, & Editing Files
24
- Scripting with Bash
25
- Intro to Python
26
- Strings
27
- Math
28
- Variables & Methods
29
- Functions
30
- Boolean Expressions
31
- Relational & Boolean Operators
32
- Conditional Statements
33
- Lists
34
- Tuples
35
- Looping
36
- Importing Modules
37
- Advanced Strings
38
- Dictionaries
39
- Sockets
40
- Building a Port Scanner
41
- The 5 Stages of Ethical Hacking
42
- Passive Recon Overview
43
- Identifying Our Target
44
- Discovering Email Addresses
45
- Breached Credentials Part 1
46
- Breached Credentials Part 2
47
- Hunting Subdomains Part 1
48
- Hunting Subdomains Part 2
49
- Identifying Website Technologies
50
- Gathering Information w/ Burp Suite
51
- Google Fu
52
- Utilizing Social Media
53
- Installing Kioptrix
54
- Scanning w/ Nmap
55
- Enumerating HTTP/HTTPS Part 1
56
- Enumerating HTTP/HTTPS Part 2
57
- Enumerating SMB
58
- Enumerating SSH
59
- Researching Potential Vulnerabilities
60
- Our Notes So Far
61
- Scanning w/ Nessus Part 1
62
- Scanning w/ Nessus Part 2
63
- Reverse Shells vs Bind Shells
64
- Staged vs Non-Staged Payloads
65
- Gaining Root w/ Metasploit
66
- Manual Exploitation
67
- Brute Force Attacks
68
- Credential Stuffing & Password Spraying
69
- Our Notes, Revisited
70
- Capstone Introduction
71
- Setting up Blue
72
- Blue Walkthrough
73
- Academy Setup
74
- Academy Walkthrough
75
- Dev Walkthrough
76
- Butler Walkthrough
77
- Blackpearl Walkthrough
78
- Conclusion
Description:
Embark on a comprehensive 12-hour journey into the world of ethical hacking. Learn essential skills from networking basics to advanced exploitation techniques. Master tools like Kali Linux, Nmap, and Metasploit. Explore key concepts including passive reconnaissance, vulnerability scanning, and manual exploitation. Practice with hands-on exercises and real-world scenarios. Develop proficiency in Python scripting and build your own port scanner. Gain insights into the day-to-day life of an ethical hacker and effective note-taking strategies. Culminate your learning with multiple walkthroughs of vulnerable machines, applying your newly acquired knowledge to penetrate systems ethically. By the end of this extensive course, acquire the fundamental skills and mindset required to pursue a career in ethical hacking and cybersecurity.

Ethical Hacking - Learn to Hack

Cyber Mentor
Add to list
0:00 / 0:00