Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack
Offered By: Cyber Mentor via YouTube
Course Description
Overview
Syllabus
- Introduction/whoami
- A Day in the Life of an Ethical Hacker
- Effective Notekeeping
- Important Tools
- Networking Refresher: Introduction
- IP Addresses
- MAC Addresses
- TCP, UDP, & the Three-Way Handshake
- Common Ports & Protocols
- The OSI Model
- Subnetting, Part 1
- Subnetting, Part 2
- Installing VMWare / VirtualBox
- Installing Kali Linux
- Configuring VirtualBox
- Kali Linux Overview
- Sudo Overview
- Navigating the File System
- Users & Privileges
- Common Network Commands
- Viewing, Creating, & Editing Files
- Starting and Stopping Services
- Installing and Updating Tools
- Bash Scripting
- Intro to Python
- Strings
- Math
- Variables & Methods
- Functions
- Boolean Expressions and Relational Operators
- Conditional Statements
- Lists
- Tuples
- Looping
- Advanced Strings
- Dictionaries
- Importing Modules
- Sockets
- Building a Port Scanner
- User Input
- Reading and Writing Files
- Classes and Objects
- Building a Shoe Budget Tool
- The 5 Stages of Ethical Hacking
- Passive Recon Overview
- Identifying Our Target
- Discovering Email Addresses
- Breached Credentials Part 1
- Breached Credentials Part 2
- End Part 1
Taught by
The Cyber Mentor
Related Courses
How To Build a Network Topology Using GNS3Coursera Project Network via Coursera IT Networking Fundamentals For Complete Beginners
Udemy CompTIA Network+ N10-007 500+ Questions + Subnetting Review
Udemy CompTIA Network+ (N10-007) Full Course & Practice Exam
Udemy The Complete Networking Fundamentals Course. Your CCNA start
Udemy