|
Introduction to Ethical Hacking
|
|
|
|
Introduction to Information Security
12:00
|
Preview
|
|
|
Information Security Threats
4:00
|
|
|
|
Introduction to Cyber Security
10:00
|
|
|
|
The CIA Triad
5:00
|
|
|
|
Who are Hackers
16:00
|
Preview
|
|
|
Types of Hackers
9:00
|
|
|
|
Introduction to Ethical Hacking
4:00
|
|
|
|
Information Warfare
7:00
|
|
|
|
Need for Ethical Hackers
7:00
|
|
|
|
Careers in Ethical Hacking
14:00
|
Preview
|
|
|
Course Overview
12:00
|
|
|
|
General Terminologies
13:00
|
|
|
|
How To become an Ethical Hacker
19:00
|
|
|
Basics and Environment Setup
|
|
|
|
Advantages and Limitations of Cyber Security
14:00
|
|
|
|
Cyber Defense
3:00
|
|
|
|
Skills of an Ethical Hacker
4:00
|
|
|
|
Information Security Policies
6:00
|
|
|
|
Vulnerability Research
4:00
|
|
|
|
Introduction to OS Linux and it's Evolution
5:00
|
|
|
|
Major Linux Distributions
4:00
|
|
|
|
Advantages of linux
6:00
|
|
|
|
Linux for Penetration Testing
6:00
|
|
|
|
Types of Hackers contd
9:00
|
|
|
|
Phases of Ethical Hacking
11:00
|
|
|
|
Introduction to Penetration Testing
4:00
|
|
|
|
Phases of Penetration Testing
8:00
|
|
|
|
Cyber Security vs Ethical Hacking
2:00
|
|
|
|
Ethical Hacking Laws and Policies
6:00
|
|
|
|
IT Act 2000
4:00
|
|
|
|
Risk Management and Methodology
8:00
|
|
|
|
Software and Hardware Requirements for a Hacking Lab
7:00
|
Preview
|
|
|
Installing and Configuring VMWare WS
2:00
|
|
|
|
Dual boot vs Virtual Machine
13:00
|
|
|
|
Choosing and Downloading Kali Distro
3:00
|
|
|
|
Configuring VM For Kali Linux
5:00
|
|
|
|
Installing Kali Linux 2019.4 on VMWare (New)
14:00
|
|
|
|
Virtual Network Configurations Explained - NAT vs Bridged vs Host Only vs Internal
11:00
|
|
|
|
Installating and Configuring DVWA
9:00
|
|
|
|
Installating and Configuring bWAPP
3:00
|
|
|
|
Installing Metasploitable on VM
7:00
|
|
|
|
Installing OWASP Broken Web Application on VMWare
10:00
|
|
|
Linux Basics
|
|
|
|
Introduction to Command Line
8:00
|
|
|
|
Windows command line
2:00
|
|
|
|
Linux command line
3:00
|
|
|
|
Linux File System
12:00
|
|
|
|
NTFS vs FAT vs EXT
4:00
|
|
|
|
Linux User Administration
9:00
|
|
|
|
Basic DOS Commands
18:00
|
|
|
|
DOS Networking Commands
15:00
|
|
|
|
Kali 2019.4 and linux file system overview
5:00
|
|
|
|
Linux Elementary Commands
9:00
|
|
|
|
Linux Networking Commands
4:00
|
|
|
|
history and grep command
3:00
|
|
|
|
Working with Linux User Administration
13:00
|
|
|
|
Linux Working with Files, Permissions and Directories
11:00
|
|
|
|
Working with Linux File Permissions
10:00
|
|
|
|
Linux Working with Groups
7:00
|
|
|
|
Linux Package Manager apt
8:00
|
|
|
|
Linux Useful Files
5:00
|
|
|
Networking Basics
|
|
|
|
The OSI Model - Open Systems Interconnection
32:00
|
|
|
|
More on OSI Model - Introduction to TCP-IP Model
9:00
|
|
|
|
TCP/IP vs OSI - The Difference
9:00
|
|
|
|
Data Link Layer and MAC Addresses
7:00
|
|
|
|
Network Layer and IP Addresses
2:00
|
|
|
|
Classful IP Addressing, Private and Special Addresses
10:00
|
|
|
|
Classless IP Addressing
6:00
|
|
|
|
Transport Layer
6:00
|
|
|
|
Ports and Port Addressing
7:00
|
|
|
|
Proxies and Proxy Servers
12:00
|
|
|
|
Introduction to TOR
10:00
|
|
|
|
Introduction to VPN
11:00
|
|
|
|
Remote Login - SSH and telnet
4:00
|
|
|
|
Introduction to NAT and Port Forwarding
26:00
|
|
|
Information Gathering and Reconnaissance
|
|
|
|
Introduction to Footprinting and Objectives
13:00
|
|
|
|
Footprinting through search Engines
9:00
|
|
|
|
Introduction to OSINT
6:00
|
|
|
|
Email Footprinting
4:00
|
|
|
|
Website Footprinting
7:00
|
|
|
|
Competitive Intelligence
9:00
|
|
|
|
Internet Archive
8:00
|
|
|
|
wget Mirroring
12:00
|
|
|
|
Website Mirroring with httrack
7:00
|
|
|
|
whois lookup
6:00
|
|
|
|
Introduction to DNS Footprinting
7:00
|
|
|
|
DNS Resource Records
11:00
|
|
|
|
DNS Footprinting with DNS Dumpster
8:00
|
|
|
|
dns.google.com
4:00
|
|
|
|
Network Footprinting
9:00
|
|
|
|
Introduction and Working of Traceroute
14:00
|
|
|
|
Traceroute Analysis
7:00
|
|
|
|
Introduction to Maltego
20:00
|
|
|
|
Maltego Information Gathering with domain name
18:00
|
|
|
|
Maltego Information Gathering with IP Address
9:00
|
|
|
|
Maltego Using the Tool Efficiently
11:00
|
|
|
|
Maltego Tranform Hub
9:00
|
|
|
|
Maltego Integration with Shodan
8:00
|
|
|
|
OSINT Framework
9:00
|
|
|
|
theHarvester
21:00
|
|
|
|
Shodan Introduction and First Look
19:00
|
|
|
|
Shodan Advanced Search with Dorks
11:00
|
|
|
|
WhatWeb
20:00
|
|
|
|
Wappalyzer
3:00
|
|
|
|
sublist3r
10:00
|
|
|
|
Subdomain Finder Websites
6:00
|
|
|
|
netdiscover
8:00
|
|
|
|
Major IP Block
4:00
|
|
|
|
Google Dorks Explained - What is Google Hacking
6:00
|
|
|
|
Working with Google Dorks - Google Dorking Practical
18:00
|
|
|
|
Footprinting with Social Engineering
18:00
|
|
|
|
Footprinting Countermeasures
17:00
|
|
|
Scanning
|
|
|
|
Basics of Scanning
8:00
|
|
|
|
Scanning Methodology
5:00
|
|
|
|
Working with ping command for live hosts
3:00
|
|
|
|
Angry IP Scanner
5:00
|
|
|
|
TCP Flags
7:00
|
|
|
|
TCP 3-Way Handshake
11:00
|
|
|
|
Introduction to Port Scanning
7:00
|
|
|
|
Port Scanning Methodology
6:00
|
|
|
|
Types of Port Scanning - TCP Connect Scan
2:00
|
|
|
|
Types of Port Scanning - TCP Stealth Scan
2:00
|
|
|
|
Types of Port Scanning - TCP Inverse Flag Scanning
1:00
|
|
|
|
Types of Port Scanning - TCP Xmas Scan
1:00
|
|
|
|
Types of Port Scanning - ACK Flag Probe Scanning
3:00
|
|
|
|
Types of Port Scanning - UDP Scan
2:00
|
|
|
|
Introduction to Nmap and First Look
5:00
|
|
|
|
Nmap - Port Scanning
12:00
|
|
|
|
Nmap - Advanced Port Scanning
14:00
|
Preview
|
|
|
Nmap - Bypass Firewalls and IDS
13:00
|
|
|
|
Nmap - Types of Scans
6:00
|
|
|
|
Port Scanning with hping3
18:00
|
|
|
|
Port Scanning with pentest-tools
6:00
|
|
|
|
Colasoft Packet Builder
19:00
|
|
|
|
Introduction to Banner Grabbing
10:00
|
|
|
|
Banner Grabbing with ID Serve
4:00
|
|
|
|
Banner Grabbing with NetCraft
4:00
|
|
|
|
Banner Grabbing with netcat
7:00
|
|
|
|
Evading IDS and Firewalls
4:00
|
|
|
|
Scanning for Vulnerabilities
1:00
|
|
|
|
Nessus Vulnerability Scanner
39:00
|
|
|
|
Nmap Scripting Engine
8:00
|
|
|
|
nikto Web Vulnerability Scanner
10:00
|
|
|
|
OpenVAS Installation and Configuration
7:00
|
|
|
|
Vulnerability Scanning with OpenVAS
13:00
|
|
|
|
Wordpress Vulnerability Scanning with wpscan
18:00
|
|
|
|
Mapping Networks
1:00
|
|
|
|
Network Topology Mapper
11:00
|
|
|
|
Spiceworks Network Mapper
4:00
|
|
|
|
LAN State Pro
11:00
|
|
|
|
Scanning Countermeasures
10:00
|
|
|
Enumeration
|
|
|
|
Introduction to Enumeration
5:00
|
|
|
|
Techniques of Enumeration
4:00
|
|
|
|
NetBIOS enumeration
7:00
|
|
|
|
SMB Enumeration
3:00
|
|
|
|
Working wiith NetBIOS and SMB Enumeration
14:00
|
|
|
|
SNMP Enumeration
10:00
|
|
|
|
LDAP Enumeration
5:00
|
|
|
|
SMTP Enumeration
3:00
|
|
|
|
Working with SMTP Enumeration
9:00
|
|
|
|
DNS Enumeration
3:00
|
|
|
|
Introduction to DNS Zones
8:00
|
|
|
|
Introduction to DNS Zone Transfer
7:00
|
|
|
|
DNS Zone Transfer using host command
4:00
|
|
|
|
nslookup tool
4:00
|
|
|
|
DNS Zone Transfer using nslookup
4:00
|
|
|
|
dig command
5:00
|
|
|
|
DNS Zone Transfer using dig command
3:00
|
|
|
|
NTP Enumeration
5:00
|
|
|
|
Enumeration Countermeasures
12:00
|
|