Introduction To Ethical Hacking and Penetration Testing
  • What Is Ethical Hacking And Penetration Testing, And How Can You Use It?
  • Introduction From Your Co-Instructor Snehil Khare about Ethical Hacking
Creating your hacking environment with VirtualBox and Kali Linux.
  • Environment setup lecture
Getting started using ethical hacking and penetration testing
  • Stealing facebook credentials via phishing attack
  • How to defend against phishing attacks
  • User Browser hacking using Beef exploitation framework
  • How to defend against browser attacks
  • User machine hacking via word and excel documents
  • How to defend against macro attacks
  • Hacking android phones for fun and profit Part 1
  • Backdooring android apps for fun and profit Part 2
  • How to defend against android attacks