Course Overview
  • Course Overview
Building Your Virtual Lab Environment
  • Video and lab - Creating a Virtual install of Kali using VirtualBox
  • Video - Installing the VirtualBox Extension Pack
  • Video and Lab - Creating a Virtual Install of CSI Linux 2021.1
  • Video and lab - Creating an Unattended Virtual Install of XP Using Virtualbox
  • Video - Taking a Snapshot of Your Current Configuration
Anonymity - Remaining Anonymous While Browsing Online
  • Video and Lab - Anonymize Kali Using Whonix
  • Video and Lab - Lab – Ensuring Anonymity Using the CSI Linux TOR/VPN
  • Video - Assigning a Random MAC Address in Kali
Passive reconnaissance
  • Video and Lab - Information Gathering Using Maltego
  • Video and Lab - Conducting OSINT Using CSI Linux Investigator
Conducting a Passive Reconnaissance Using Shodan
  • Video and Lab - Preparing CSI Analyst to Use Shodan
  • Video and Lab - Using Shodan to Find Vulnerable Devices
  • Video and lab - Using Shodan to Search for Vulnerable Databases
NMap
  • Video and Lab - Introduction to NMap
  • Video and lab - NMap Scripting Engine (NSE)
  • Video and lab - Scanning for WannaCry Ransomware
Scanning for Vulnerabilities Using NESSUS
  • Video and Lab - Installing NESSUS Using Docker
  • Video and lab - Scanning for Vulnerabilities Using Nessus
  • Video - Using Your Nessus Scan Results
Scanning for Vulnerabilities Using OpenVAS
  • Video and Lab - Installing OpenVAS Using Docker
  • Video and Lab - Scanning for Vulnerabilities Using OpenVAS
Exploiting Windows XP
  • Video and Lab- Using Metasploit to Launch a DOS Attack Against Windows XP
  • Video and Lab - Establishing A VNC Shell Using Meterpreter
  • Video and Lab - Using Meterpreter to backdoor Windows XP
  • Lab - Exploiting Vulnerable Applications on Windows XP SP2
  • Lab - Hacking Windows XP via MS11-006 Windows Shell Graphics Processing
Exploiting Linux
  • Video and lab - Installing Metasploitable2 Using VirtualBox
  • Lab - Learning to Hack Linux Using Metasploitable2
  • Lab - Exploring Endpoint Attacks
Social Engineering
  • Video and Lab - Using the Social Engineering Toolkit (SET)
BASH Scripting for Pentesters
  • Video and Lab - Introduction to BASH Scripting
  • Video and Lab - Creating a BASH Script for Scanning Vulnerable Ports
  • Lab -Linux BASH Shell Scripting -Task Scheduling
Password Cracking
  • Video and Lab – Password Cracking Using Medusa
  • Video and Lab - Passwords Cracking Using Mimikatz
  • Video and Lab - Password Cracking Using Hydra
Pentesting Wireless Networks
  • Video and Lab - Installing a Wireless Adapter in Kali
  • Video and Lab - Hacking a Wireless Network Using Kali Linux
  • Video and Lab - Wireless Deauthentication Attack
Web Based Application Attacks
  • Video and Lab - Installing w3af in Kali Linux Using Docker
  • Video and Lab – Conducting A Website Vulnerability Scan Using w3af
  • Video and Lab – Performing a Browser Based Attack
  • Video and lab - SQL Injection Attack Using SQLmap
Browser Exploitation Framework (BeEF)
  • Video - Configure Kali for Exploitation the WAN
  • Video and lab - The Browser Exploitation Framework (BeEF)
Capture the Flag Walkthrough - Mr. Robot
  • Lab file - Capture the Flag (CTF) – Mr. Robot
  • Video Walk Through -Key #1
  • Video Walk through - Key #2
  • Video Walk Through - Key #3
Capture the Flag Walkthrough – Stapler
  • Lab File - Walkthrough - CTF – Stapler
  • Video - Capture the Flag - Stapler Part 1
  • Video - Capture the Flag - Stapler Part 2
  • Video - Capture the Flag - Stapler Part 3
Bonus - Digital Forensics Case Management
  • Video and Lab - Getting Started with Autopsy