Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack
Offered By: Cyber Mentor via YouTube
Course Description
Overview
Syllabus
- Introduction/whoami
- A Day in the Life of an Ethical Hacker
- Effective Notekeeping
- Important Tools
- Networking Refresher: Introduction
- IP Addresses
- MAC Addresses
- TCP, UDP, & the Three-Way Handshake
- Common Ports & Protocols
- The OSI Model
- Subnetting, Part 1
- Subnetting, Part 2
- Installing VMWare / VirtualBox
- Installing Kali Linux
- Configuring VirtualBox
- Kali Linux Overview
- Sudo Overview
- Navigating the File System
- Users & Privileges
- Common Network Commands
- Viewing, Creating, & Editing Files
- Starting and Stopping Services
- Installing and Updating Tools
- Bash Scripting
- Intro to Python
- Strings
- Math
- Variables & Methods
- Functions
- Boolean Expressions and Relational Operators
- Conditional Statements
- Lists
- Tuples
- Looping
- Advanced Strings
- Dictionaries
- Importing Modules
- Sockets
- Building a Port Scanner
- User Input
- Reading and Writing Files
- Classes and Objects
- Building a Shoe Budget Tool
- The 5 Stages of Ethical Hacking
- Passive Recon Overview
- Identifying Our Target
- Discovering Email Addresses
- Breached Credentials Part 1
- Breached Credentials Part 2
- End Part 1
Taught by
The Cyber Mentor
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity