Introduction to the Ultimate Ethical Hacking Boot Camp
  • Welcome to the Ultimate Ethical Hacking Boot Camp
  • What is Ethical Hacking
  • Careers for Ethical Hackers
  • Wireless Lab Setup "Hack"
  • Wireless Hacking Module Disclaimer
  • Interview: Oracle & Shodan & CNN
Hacking Lab Setup - Windows & Mac Instructions
  • Introduction to Lab Setup
  • Vmware Lab Settings - + BONUS: CUSTOM Backgrounds for your virtual machines.
  • Installing Windows XP
  • Installing Server 2008
  • Installing Kali Linux from ISO
  • Installing Kali Linux Prebuild Virtual Machine
  • Installing Windows 7
  • MAC USERS-----OSX-Virtual Box - Windows XP Pro SP2
  • MAC USERS-----OSX-Virtual Box - Setup + Kali Linux VM Installation
  • MAC USERS-----OSX-Virtual Box - Windows 7
  • MAC USERS-----OSX-Virtual Box - Server 2012
Recon: Phase 1 of the Hacking Process
  • Introduction to Recon / Footprinting
  • Know the Process & Methodology of Footprinting
  • Google Hacking Secrets
  • Demo: Explore Google Hacking
  • Recon via Social Networking
  • Demo: Busting Fake Profiles using Reverse Image Search
  • Interview: Google Maps & Scientology
Scanning: Phase 2 of the Hacking Process
  • Scanning: Introduction
  • Types of Scans
  • Tools of the Trade
  • Demo: Explore how to use NMap
Enumeration: Phase 3 of the Hacking Process
  • Enumeration
Hacking: Phase 4 of the Hacking Process
  • Hacking: Introduction
  • Metasploit - An invaluable resource
Hacking Wireless Networks
  • Hacking Wireless Networks: Introduction
  • Overview: Wireless Networks
  • Demo: Hacking WEP
  • Demo: Hacking WPA2
Password Cracking
  • Password Cracking: Introduction
  • Windows Password Cracking
  • Demo: Cracking Passwords
Social Engineering
  • Social Engineering: Introduction
  • Social Engineering: Methodology
  • Phishing / Spear Phishing
  • Demo: Maltego
  • Demo: Social Engineers Toolkit
Bonus Content
  • Cyber Fraud: The Web of Lies - Free copy for my students