Introduction to Ethical Hacking and Security Industry Terminology
  • Course Intro
  • OSI Model and CIA
  • Spoofing and Hijacking
  • Cross Site Scripting & Cross Site Request Forgery
  • SQL Injection
  • Wireless Network Security
  • Common Malware
Kali 101
  • About Kali and use cases
  • Installing and configuring Kali on a VMware Virtual Machine
  • Configuring the network adapter
  • Booting Kali for the first time
  • Basic commands with Kali and VMware
  • Basic Kali Configuration
  • Configuring your network
  • Requesting and Configuring IP Addresses
  • Managing services in Kali
  • Managing Apache in Kali
  • Managing SSH in Kali
  • Managing MySQL in Kali
  • Vulnerability Analysis Tools Overview
  • Tools Overview
  • Information Gathering Tools Overview
  • Maltego
  • Web Applications Tools Overview
  • Burp Suite
  • Password Attacks Tools Overview
  • Ophcrack
  • Armitage
  • Cracking Wi-Fi Passwords on a WEP Network
  • Top 10 Security Tools Overview
Penetration Testing Methodologies
  • Penetration Testing
  • Pen-Testing Techniques
  • Scope of Pen-Testing
  • Types of Pen-Testing and its Strategies Part 1
  • Types of Pen-Testing and its Strategies Part 2
  • Types of Pen-Testing and its Strategies Part 3
  • Types of Pen-Testing and its Strategies Part 4
BONUS: Labs on Source Code Fuzzing, Infecting MySQL logs and more!
  • Injecting MySQL Logs
  • Threat Actor Attribution
  • Understanding Heap Overflow Protection
  • Source Code Fuzzing Lab: Crash Analysis using American Fuzzy Lop
  • Intercepting Process Injection on Suspended Threads
Get the full course for answers to your questions + 30 hours of HD video!
  • Bonus Lecture: Get access to all our cybersecurity courses with a deep discount