Course Description

Kiran Kumar

Course curriculum

  • 1

    Introduction

    • 0-Ethical-hacking-Demo

    • 1-Introduction To Ethical Hacking - Copy (2)

    • 2-Basics Of Linux

    • 3-WIndows Command Line Tools

    • 4-Internet Governance

  • 2

    Lab Setup

    • 5-1Settingup-Lab

    • 5-2Lab-2003Server

    • 5-3Lab-Ubuntu-installation

    • 5-4Lab-backtrack-installation

    • 5-5Lab-BTTools-Instllation-on-Ubuntu

    • 5-6-XAMPP-Installation

  • 3

    Ethical Hacking (Basics to Advance) - Part 1

    • 6-Reconnaisance

    • 7-1-Google Hacking

    • 7-2-google-hacks

    • 8and9-1-Scanning and Enumeration

    • 8and9-2-APS

    • 8and9-2-APS

    • 8and9-3-Nmap

    • 8and9-4-LBD

    • 8and9-5-Scan

    • 8and9-6-DumpSec

  • 4

    Ethical Hacking (Basics to Advance) - Part 2

    • 10- System Hacking Part 3

    • 10- System Hacking-WinCrack

    • 10-System Hacking Part 1

    • 10-System Hacking Part 2

    • 10-System Hacking Part 4

    • 11-1-Proxy Servers

    • 11-2-Proxy-EPS

    • 11-3Proxy-tor

    • 12- Keyloggers

    • 13-Trojans

    • 14-Virus

    • 15-Social Engineering

    • 16-Email Hacking

    • 17-1-Sniffing

    • 17-2-SniffWireshark

    • 17-3-cain-able

    • 18-1Session-Hijack

    • 18-2Session-Hijack

    • 18-3Session-Hijacking

    • 19-Web Server Hacking

    • 20-1-SQL Injection

    • 20-2-SQL Injection

    • 20-3-SQL Injection

    • 21-1-Cross Site Scripting

    • 21-2-Cross Site Scripting

    • 22-CSRF Part 1

    • 22-CSRF Part 2-TESTER DEMO

    • 22-CSRF Part 3 - Countermesures

    • 23- Remote File Inclusion

    • 24and25IntroductiontoExploitWriting-BufferOverflows

    • 26-Reverse-Engineering

    • 27Cryptography

    • 28-Firewalls

    • 29-Denial Of Service Part - 1

    • 29-Denial Of Service Part - 2

    • 30-Physical Security

    • 31-Wireless Hacking

  • 5

    Penetration Testing

    • 32-Metasploit Part 1

    • 32-Metasploit Part 2

    • 33-Penetration Testing Part 1

    • 33-Penetration Testing Part 2

    • 33-Penetration Testing Part 3

    • 34-Router Hacking

    • 35-Mobile Hacking

    • 36-Web App Pentesting Part 1

    • 36-Web App Pentesting Part 2

    • 36-Web App Pentesting Part 3

    • 36-Web App Pentesting Part 4

    • 36-Web App Pentesting Part 5

    • 36-Web App Pentesting Part 6