Главная
Study mode:
on
1
- Introduction/whoami
2
- A Day in the Life of an Ethical Hacker
3
- Effective Notekeeping
4
- Important Tools
5
- Networking Refresher: Introduction
6
- IP Addresses
7
- MAC Addresses
8
- TCP, UDP, & the Three-Way Handshake
9
- Common Ports & Protocols
10
- The OSI Model
11
- Subnetting, Part 1
12
- Subnetting, Part 2
13
- Installing VMWare / VirtualBox
14
- Installing Kali Linux
15
- Configuring VirtualBox
16
- Kali Linux Overview
17
- Sudo Overview
18
- Navigating the File System
19
- Users & Privileges
20
- Common Network Commands
21
- Viewing, Creating, & Editing Files
22
- Starting and Stopping Services
23
- Installing and Updating Tools
24
- Bash Scripting
25
- Intro to Python
26
- Strings
27
- Math
28
- Variables & Methods
29
- Functions
30
- Boolean Expressions and Relational Operators
31
- Conditional Statements
32
- Lists
33
- Tuples
34
- Looping
35
- Advanced Strings
36
- Dictionaries
37
- Importing Modules
38
- Sockets
39
- Building a Port Scanner
40
- User Input
41
- Reading and Writing Files
42
- Classes and Objects
43
- Building a Shoe Budget Tool
44
- The 5 Stages of Ethical Hacking
45
- Passive Recon Overview
46
- Identifying Our Target
47
- Discovering Email Addresses
48
- Breached Credentials Part 1
49
- Breached Credentials Part 2
50
- End Part 1
Description:
Embark on a comprehensive 7-hour video tutorial covering the fundamentals of ethical hacking. Dive into the daily life of an ethical hacker, master effective note-taking techniques, and explore essential tools. Gain a solid understanding of networking concepts, including IP and MAC addresses, TCP/UDP protocols, and the OSI model. Learn to set up a hacking environment with VMware/VirtualBox and Kali Linux. Develop proficiency in Linux commands, file system navigation, and user privileges. Acquire programming skills in Bash scripting and Python, covering topics from basic syntax to advanced concepts like socket programming and building a port scanner. Explore the five stages of ethical hacking, focusing on passive reconnaissance techniques such as identifying targets, discovering email addresses, and investigating breached credentials. Prepare for a deep dive into the world of cybersecurity with this comprehensive introduction to ethical hacking.

Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack

Cyber Mentor
Add to list
0:00 / 0:00