-
Introduction to Ethical Hacking
-
2. The Ethical Hacking Process
-
2.1 The Ethical Hacking Process PPT
-
3. The Advantages of Becoming an Ethical Hacker
-
Diving into Linux Basics
-
Why Kali Linux
-
Booting Up Kali Linux
-
The Linux Filesystem
-
Managing Linux Services
-
Searching, Installing, and Removing Tools
-
7. Kali Linux CLI - Environment Variables
-
8. Kali Linux CLI - Bash History Command
-
Kali Linux CLI - Piping and Redirection
-
Kali Linux CLI - Text Searching and Manipulation
-
11. Kali Linux CLI - Editing Files
-
12. Kali Linux CLI - Comparing Files
-
13. Kali Linux CLI - Managing Processes
-
14. Kali Linux CLI - File and Command Monitoring
-
15. Kali Linux CLI - Downloading Files
-
16. Kali Linux CLI - Customizing the Bash Environment
-
17. Netcat (nc) Essentials
-
18. Bash Scripting - Our First Bash Script
-
19. Bash Scripting - Variables
-
20. Bash Scripting - If, Else, Elif Statements
-
21. Bash Scripting - Loops
-
22. Bash Scripting - Functions
-
-
Web Application Security
-
How Web Applications Work
-
How Web Applications Work - PPT
-
HTTP (Hypertext Transfer Protocol)- PPT
-
What is DNS and How DNS works ?
-
OWASP Top 10 Vulnerabilities
-
Web Application Assessment Tools - DIRB
-
Web Application Assessment Tools - Burp Suite
-
Web Application Assessment Tools - Nikto
-
OWASP Top 10 Vulnerabilities PPT
-
Networking Essentials & Wireshark Basics
-
1. Networking Essentials
-
1.1 Networking Essentials- PPT
-
2. OSI model
-
3. What is Wireshark and why should you learn it
-
4. Install Wireshark
-
5. WireShark Getting Started
-
6. Sets a filter for any packet that has x.x.x.x as IP address
-
7. Sets a conversation filter between two specific IP addresses
-
8. Sets a filter to display all http and dns protocols
-
9. Sets filters for any TCP packet with a specific source or destination port
-
10. Displays all TCP packets that contain a certain term
-
11. Filters all HTTP GET and POST requests
-
12. Filter out certain types of protocols
-
13. Can Wireshark capture passwords
-
14. Plain text network protocols
-
15. Capture Insecure Connections (Net Cat)
-
16. Capture FTP Passwords
-
17. Extract files from FTP using Wireshark
-
18. Capture HTTP Passwords
-
19. Capture files (images) from HTTP traffic
-
-
NMAP Essentials & Port Scanning
-
Detect service-daemon versions
-
Port Scanners Essentials
-
What is Nmap
-
Preparing the Environment
-
Scanning Techniques of Nmap
-
Basic Nmap Scan against IP or host
-
Nmap Ping Scan
-
Scan specific ports or scan entire port ranges
-
Scan multiple IP addresses
-
Scan hosts and IP addresses reading from a text file
-
Save your Nmap scan results to a file
-
Disabling DNS name resolution
-
Scan + OS and service detection with fast execution
-
Detect servicedaemon versions
-
Scan using TCP or UDP protocols
-
CVE detection using Nmap
-
Launching DOS with Nmap
-
Launching brute force attacks
-
Detecting malware infections on remote hosts
-
Nmap Firewall and IDS Evasion Techniques
-
-
Python & Coding Basics
-
1. What is Python and why it is used in Security
-
1.1 What is Python and why it is used in Security PPT
-
2. Install Python
-
3. Hello World
-
4. Data Types
-
5. Numbers
-
6. Math functions
-
7. Operator Precedence
-
8. Variables
-
9. Strings
-
10. Strings Concatenate
-
11. Types conversion
-
12. Escape sequence
-
13. Formatted strings
-
14. Strings indexes
-
15. Boolean
-
16. Lists
-
17. List Methods
-
18. Matrix
-
19. None
-
20. Dictionary
-
21. Dictionary Methods
-
22. Tuple
-