Course curriculum

  • 1

    Introduction to Ethical Hacking

    • Introduction

  • 2

    Footprinting and Reconnaissance

    • Passive Information Gathering Theory

    • Active & Passive Information Gathering In Kali Linux

    • DNSDUMSTER, OSINT Framework, & THATSTHEM For Passive Search Engine Recon In Kali Linux

  • 3

    Scanning Networks

    • Network Scanning Theory

    • Network Scanning Commands In Kali Linux

    • Port Forwarding & Host Visibility In Networks With Kali Linux

    • Network Scanning Using Nmap NetDiscover & Bettercap

  • 4

    Enumeration

    • Enumeration Fundamentals

    • Basics Of Enumeration Using Kali Linux

    • Advanced Enumeration Using Nmap & Kali Linux

    • Enumeration With Wpscan & Kali Linux

    • Enumeration Implementation

  • 5

    Vulnerability Analysis

    • Vulnerability Analysis Fundamentals & Theory

    • Vulnerability Analysis Demonstration Including How To Check Manually

    • Basic Nessus Installation On Windows 7

    • Fundamentals Of Nessus & Automated Vulnerability Scans

    • Nessus Installation On Kali Linux

  • 6

    System Hacking

    • Fundamentals Of System Hacking & Remote Shells

    • Basic Linux Commands & Fundamentals Of File Structure

    • Fundamentals Of Processes & Nano

    • Basics Of VIM

    • Linux Processes & Permissions

    • Armitage Basics With Kali Linux

    • Metasploit Basics With Kali Linux

    • Attacking Windows 7 With EternalBlue & Kali Linux

    • Attacking Windows 7 With MSFvenom & Kali Linux

    • Command Prompt PowerShell & Permission Basics In Windows

  • 7

    Malware Threats

    • Malware Fundamentals

    • C Fundamentals Of Hacking Programming & Files Using Kali Linux

    • Basics Of Python Coding For Networking & Hacking With Kali Linux

    • Generating Payloads With TheFatRat & Kali Linux

  • 8

    Sniffing

    • Fundamentals Of Sniffing & Sniffing Tools

    • Netsniff-ng, Ettercap, Wireshark

    • TcpDump

    • Wireshark

  • 9

    Social Engineering

    • Social Engineering Fundamentals

    • Social Engineering Facebook Attack Using Social-Engineer Toolkit (SET) And Kali Linux

    • Social Engineering Attacks Using BeEF & Kali Linux

    • Social Engineering Toolkit (SET) - Spear-Phishing Attack

    • Social Engineering Toolkit (SET) - Payload

  • 10

    Denial of Service

    • Fundamentals Of Denial of Service (DoS) & Distributed Denial of Service (DDoS)

    • Basics Of DoS With Kali Linux

    • DoS With Low Orbit Ion Cannon (LOIC) & Kali Linux

    • How To Connect Kali Linux In Tor Network

    • How To Create A Script Which Connects You To Tor Network With Bash & Kali Linux

    • DoS Through Tor Network With Kali Linux

  • 11

    Session Hijacking

    • Session Hijacking Fundamentals

    • Becoming Man in the Middle (MITM) With Kali Linux

    • Sniffing With Bettercap & Kali Linux

    • Basics Of Burp Suite With Kali Linux

    • Session Hijacking With Kali Linux

  • 12

    Evading IDS, Firewalls, and Honeypots

    • Evading Fundamentals

    • Installing Snort IDS On Windows 7

    • How To Create Snort Rules On Windows 7

    • Snort On Linux

    • Setting Up A Vulnerable Windows 7 Honeypot

    • Honeypots

    • Evading Firewalls With Nmap & Kali Linux

  • 13

    Hacking Web Servers

    • Hacking Web Servers Fundamentals

    • Installing Python 3 On Windows 7 & Setting Up A Simple Python HTTP Server

    • Installing XAMPP On Windows 7

    • Installing Apache & Working With A Simple Web Server On Kali Linux

    • Working With Web Servers On Kali Linux

    • Installing & Playing Around With Bee-Box & Kali Linux

    • Working With Bee-Box On Kali Linux

    • Hacking Web Servers With Kali Linux

    • Shellshock

  • 14

    Hacking Web Applications

    • Web Application Hacking Fundamentals

    • HTML Injection With Kali Linux

    • Basics Of Burp Suite & Requests With Kali Linux

    • Iframe Injection With Kali Linux

    • Remote Commands Injection With Kali Linux

    • PHP Arbitrary Code Injection With Kali Linux

    • Broken Authentication

    • Heartbleed

    • Cross-site scripting (XSS)

    • Stored Cross-site Scripting (XSS) - GET

    • Reflected Cross-site Scripting (XSS) - POST

    • Reflected Cross-site Scripting (XSS) - GET

    • XSS - Reflected (JSON)

    • XSS - Reflected (AJAX/JSON)

    • Exploiting Unencrypted Communication With Bettercap

    • Fundamentals Of Robots.txt File

    • Arbitrary Files Upload

    • Cross-Site Request Forgery (CSRF)

    • Cross-Site Request Forgery (CSRF) Transfer Hacking

    • phpinfo() Fundamentals

    • Directory Traversal With Kali Linux

    • Fuzzing With OWASP Zap

    • Cookie Encoding Fundamentals

    • Remote Code Execution (RCE) Vulnerability

  • 15

    SQL Injection

    • SQL Injection Fundamentals (Part 1)

    • SQL Injection Fundamentals (Part 2)

    • SQL Injection With Kali Linux

    • Post SQL Injection With Kali Linux

    • Login SQL Injection With Kali Linux

    • SQLite Injection With Kali Linux

    • SQL Injection In User Agent

  • 16

    Hacking Wireless Networks

    • Wireless Network Theory

    • Hacking Wireless Networks Theory

    • Wi-Fi Hacking Tools Theory

    • Encryption & Cryptography Theory

    • Wardriving Theory

    • Wardriving Examples

    • Wifiphisher

    • Aircrack-ng Suite

    • Wireshark

    • Hacking With Wifiphisher (Part 1)

    • Hacking With Wifiphisher (Part 2) & WiFi-Pumpkin

    • Hacking Wireless WPA Networks With Aircrack-ng Package

    • Hacking Wireless Networks With Fluxion & Kali Linux

  • 17

    Hacking Mobile Platforms

    • Mobile Devices Theory

    • Mobile Hacking Theory

    • Android Hacking Tools

    • Hacking Mobile Devices Engagement

    • iOS Security Controls Theory

    • Android Security Controls Theory

    • How To Protect Your Android Smartphone

    • How To Install Android Emulator

    • Android Emulators

    • How To Install Android As A Virtual Machine

    • Hacking Android Devices With Metasploit

    • Metasploit Android

    • Becoming Persistent In Android System

  • 18

    IoT Hacking

    • Internet of Things (IoT, 1)

    • Internet of Things (IoT, 2)

    • Internet of Things (IoT, Hacking Tools)

    • Hacking Internet of Things (IoT, Part 2)

    • Internet of Things (IoT Scenario, Part 1)

    • Internet of Things (IoT Scenario, Part 2)

    • Smart Devices

    • Amazon Web Services (AWS) Basics

  • 19

    Cloud Computing

    • Cloud Computing Theory (Part 1)

    • Cloud Computing Theory (Part 2)

    • Cloud Security Controls

    • Data Centers

    • Cloud Solutions

    • Microsoft Azure Cloud Fundamentals

    • Using Google Drive Plus - Tips & Tricks

    • Using Drive For Hacking

    • Hacking Into Data Centers - Tips, Tricks, & Techniques

    • Infrastructure as a Service (IaaS)

    • Platform as a Service (PaaS)

    • Software as a Service (SaaS)

  • 20

    Cryptography

    • Cryptographic Theory (Part 1)

    • Cryptography Theory (Part 2)

    • Asymmetric Encryption

    • Symmetric Encryption

    • Secure Sockets Layer (SSL) & Transport Layer Security (TLS)

    • Pretty Good Privacy (PGP)

    • Advanced Encryption Standard (AES)

    • Wi-Fi Protected Access II (WPA2)

    • Wi-Fi Protected Access 3 (WPA3)

    • Transport Layer Security (TLS) 1.3

    • Hashing Algorithms

    • Breaking The Hash

    • Hashing Analysis & Basic Encryption

    • Creating A Password Dictionary

    • Networking & Encrypting With Python

    • File Encryptor With C

    • Brute Forcing SSH Service Using Hydra

    • Linux MAC Passwords - Theory

    • Linux MAC Password - Practical

    • How Windows Manages Passwords

    • Windows Passwords Management

    • Cracking Passwords Theory

    • Cracking Offline Passwords With John the Ripper

    • Digital Certificates