Course curriculum

  • 1

    Welcome to Your Ethical Hacking Course!

    • Course Introduction

  • 2

    Course Introduction & Lab Setup

    • Hacking Lab Setup

    • Virtualization Experience

  • 3

    Hacking with Kali Linux

    • Kali Linux Overview

    • Kali Linux Hacking Tools

    • Customizing Your Kali Linux Environment

    • Metasploit Database Setup

  • 4

    Linux Refresher

    • Linux Refresher

  • 5

    Tilix - Tiling Terminal Emulator

    • Improving Your Terminal Efficiency with Tilix

  • 6

    Central InfoSec CTF

    • Capture the Flag (CTF)

    • Central InfoSec CTF

    • Central InfoSec CTF Categories

  • 7

    Central InfoSec Vulnerable Web Server

    • Vulnerable Web Server Overview

  • 8

    Networking

    • Network Nodes

    • Networking Overview

    • Communication Protocols

    • Network Links

    • Network Topology

    • Network Performance

    • Internet Protocol (IP) Addresses

    • Geographic Scale

    • MAC Address

    • Routing & CIDRs

    • Network Building Blocks

    • Organization Scope

    • Network Security

    • TCP & UDP

    • Network Packets & Sniffing Traffic

    • OSI Model

    • Ports, Protocols, & Services

  • 9

    Laws & Compliance

    • Legal Concerns

    • Compliance

  • 10

    Penetration Testing

    • Penetration Testing Terminology

    • Penetration Testing

  • 11

    Penetration Testing Methodology

    • Penetration Testing Methodology Overview

    • Pen Test Methodology: Pre-Engagement Interactions

    • Pen Test Methodology: Intelligence Gathering

    • Pen Test Methodology: Threat Modeling

    • Pen Test Methodology: Vulnerability Analysis

    • Pen Test Methodology: Exploitation

    • Pen Test Methodology: Post Exploitation

    • Pen Test Methodology: Reporting

  • 12

    Tradecraft, Cryptography, & Steganography

    • Tradecraft

    • Cryptography

    • Steganography

  • 13

    Password Hacking & Security

    • Password Security Overview

    • Password Attacks

    • Windows vs Unix Passwords

    • Password Attack Tools

    • Basic Rockyou Filtering

    • Advanced Rockyou Filtering

    • Rockyou String Length Filtering

    • Password Attacks with Hydra

    • Cracking Hashes with John

    • 7z Crack

  • 14

    OSINT, Reconnaissance, Scanning, & Banner Grabbing

    • Open-Source Intelligence (OSINT)

    • Reconnaissance

    • Scanning

    • Banner Grabbing

  • 15

    Scanning with Nmap

    • Nmap Overview

    • Nmap Host Discovery & DNS Resolution

    • Nmap Common Scan Options

    • Nmap Version Detection & Operating System Detection

    • Nmap Scanning Exclusions

    • Nmap Working with Input & Output Files

    • Nmap Scan Types

    • Nmap Cloaking & Spoofing Scans

    • Nmap Advanced Scanning Options

    • Nmap Scripting Engine for Scanning

    • Zenmap Overview

    • Nmap Vulnerability Scanning

  • 16

    Netcat Shells

    • Netcat

  • 17

    Vulnerability Scanning with OpenVAS

    • OpenVAS Overview

    • OpenVAS Installation

    • OpenVAS Setup

    • OpenVAS Startup

    • OpenVAS Console Access

    • OpenVAS Dashboard Overview

    • OpenVAS Scanning

    • OpenVAS Scan Results

    • OpenVAS Scan Result Findings

    • OpenVAS Reporting

    • OpenVAS Vulnerability Scanning

  • 18

    Exploitation Using Metasploit

    • Metasploit Overview

    • Metasploit Terminology

    • Introduction to Metasploit

    • Metasploit Initialization

    • Metasploit Workspaces

    • Metasploit Database

    • Metasploit Commands by Category

    • Metasploit Search Command

    • Metasploit Show Command

    • Other Metasploit Commands

    • Meterpreter

    • Metasploit Usage

    • Exploitation with Metasploit

  • 19

    Creating Exploit Payloads with Msfvenom

    • Metasploit Terminology Refresher

    • Msfvenom Overview

    • Msfvenom Listing Module Types

    • Msfvenom Payloads

    • Msfvenom Formats

    • Msfvenom Architectures & Platforms

    • Msfvenom Encoders

    • Msfvenom Improving Exploit Payloads

    • Creating Exploit Payloads with Msfvenom

    • Metasploit Listener Refresher

    • Exploitation Demo with Windows & Meterpreter

    • Exploitation Demo with Linux & Netcat

    • Exploiting Apache Tomcat Manager

  • 20

    Exploiting Metasploitable 2

    • Metasploitable 2 Overview

    • Exploiting Metasploitable 2

    • vsFTPd Backdoor

    • ProFTPD Weak Passwords

    • Apache PHP-CGI Argument Injection RCE

    • UnrealIRCd Backdoor

    • Samba Command Injection

    • MySQL

    • Remote Execution Service

    • Rogue Shell Backdoor

    • Java RMI Server Insecure Configuration

    • DistCC Daemon Command Execution

    • Exploiting Metasploitable 2 Web Apps

    • Exploiting Apache Tomcat Manager

  • 21

    Common File Extensions

    • Common File Extensions

  • 22

    Common Network Vulnerabilities

    • Common Network Vulnerabilities

  • 23

    Wi-Fi Hacking & Wireless Technology

    • Wireless Technology & Antennas

    • Wi-Fi Antennas

    • Directional Antennas

    • Semi-Directional Antennas

    • Omni-Directional Antennas

    • Types of Wireless Networks

    • Wardriving

    • Wi-Fi Regulations and Safety

    • Wi-Fi Hacking & Penetration Testing

    • Hacking with Nmap & Wifite

    • Securing Your Wireless Network

    • DHCP vs Static IP & MAC Address

    • SSID & Broadcasting Power

    • WEP vs WPA vs WPA2 & TKIP vs AES

    • WEP & WPA

    • WPA2 & Recommended Settings

  • 24

    Course Conclusion

    • Congrats on Completing the Course!