Course curriculum

  • 1
    Introduction to Ethical Hacking
    • Introduction to ethical hacking. What is it in detail?
    • Prerequisites for getting the most out of this course.
    • Basic terminology - white hat, gray hat, and black hat hacking.
    • Basic terminology - SQL injections, VPN, proxy, VPS, and keyloggers.
  • 2
    Build your hacking environment!
    • Updated Kali Linux installation guide.
    • Installing VirtualBox with RPM and why use a virtual machine.
    • Installing VirtualBox using the default package manager from repositories.
    • Creating the virtual environment.
    • Installating VirtualBox on Windows.
    • Kali Linux installation within a virtual environment.
    • Booting up Kali Linux for the first time.
    • Installing VirtualBox Guest Additions.
  • 3
    Linux Terminal and CLI
    • Introduction to the Linux terminal.
    • Linux command line interface (CLI) basics.
    • Linux CLI explained in greater detail.
  • 4
    What is Tor? How can you use it to protect your anonymity online?
    • Using Tor to protect your anonymity online.
    • Tor continued.
  • 5
    ProxyChains for using proxy servers, hiding your ip, and obtaining access.
    • Proxychains for using proxy servers, hiding your IP, and obtaining access.
    • Proxychains part 2.
    • Proxychains part 3.
  • 6
    What is a Virtual Private Network (VPN) and how you can stay anonymous with VPN?
    • Staying anonymous with a virtual private network (VPN).
    • VPN continued.
  • 7
    What is a macchanger? How can you use it to change your mac address?
    • Macchanger part 1.
    • Macchanger part 2.
  • 8
    Footprinting with Nmap and external resources.
    • Footprinting with nmap.
    • Nmap continued.
    • External resources using public listings of known vulnerabilities.
  • 9
    Attacking wireless networks. Overview of the tools.
    • Introduction to wifi cracking WPA/WPA2.
    • Aircrack and reaver installation.
    • Installing aircrack-ng on Windows and crunch on Linux.
  • 10
    Breaking WPA/WPA2 encryption. WiFi hacking and WiFi hacker training.
    • Aircrack-ng and crunch usage example part 1.
    • Aircrack-ng and crunch usage example part 2.
    • Aircrack-ng and crunch usage example part 3.
    • Cracking WPS pins with reaver part 1.
    • Cracking WPS pins with reaver part 2.
    • Cracking WPS pins with reaver part 3.
  • 11
    Signal jamming and denial of service.
    • Signal jamming and denial of service.
    • Signal jamming and denial of service continued.
  • 12
    SSL strips.
    • SSL strip part 1.
    • SSL strip part 2.
    • SSL strip part 3.
  • 13
    Let's have a bit of fun!
    • Funny things part 1.
    • Funny things part 2.
    • Funny things part 3.
  • 14
    Evil twin method! Clone wireless access points to steal data.
    • Evil twin part 1.
    • Evil twin part 2.
    • Evil twin part 3.
  • 15
    Attacking routers to give you free reign over the entire network!
    • Using known vulnerabilities part 1.
    • Using know vulnerabilities part 2.
    • Using known vulnerabilities part 3.
  • 16
    DNS setting hacking to redirect users with post authentication exploitation.
    • Post authentication exploitation (DNS) part 1.
    • Post authentication exploitation (DNS) part 2.
    • Post authentication exploitation (DNS) part 3.
  • 17
    Website attacks with SQL injections.
    • SQL injection part 1.
    • SQL injection part 2.
    • SQL injection part 3.
    • SQL injection part 4.
    • SQL injection part 5.
  • 18
    Brute-forcing methods for cracking passwords.
    • Cracking hashes.
    • Cracking linux passwords with john the ripper part 1.
    • Cracking linux passwords with john the ripper part 2.
    • Cracking windows passwords with john the ripper.
    • Hydra usage part 1.
    • Hydra usage part 2.
  • 19
    Denial of Service (DoS) attacks demonstrated and explained.
    • DoS attack demo part 1 - introduction to denial of service attacks.
    • DoS attack demo part 2 - combine slowloris.pl with nmap.
    • DoS attack demo part 3 - featuring ha.ckers.org.
  • 20
    Reverse shells. Gain remote control of any device!
    • Intro to metasploit and reverse shells.
    • Metasploit continued.
    • Making reverse shells persistent on another system and escalating privileges.
    • Creating a persistent reverse shell with Metasploit.
    • Netcat.
    • How to upload a reverse shell onto a web server.