Course curriculum

    1. What is Ethical Hacking

      FREE PREVIEW
    2. Red Team Vs Blue Team

    3. Why Kali Linux ?

    1. Booting Up Kali Linux

    2. The Linux Filesystem

    3. Basic Linux Commands

    4. Managing Kali Linux Services

    5. Searching, Installing, and Removing Tools

    1. Environment Variables

    2. Bash History Command

    3. Piping and Redirection

    4. Text Searching and Manipulation

    5. Editing Files

    6. Comparing Files

    7. Managing Processes

    8. File and Command Monitoring

    9. Downloading Files

    10. Customizing the Bash Environment

    1. Netcat (nc)

    1. What is Wireshark and why should you learn it?

    2. Basics of Computer Networking

    3. OSI model

    4. Install Wireshark

    5. WireShark Getting Started

    6. Sets a conversation filter between two specific IP addresses

    7. Sets a filter to display all http and dns protocols

    8. Sets filters for any TCP packet with a specific source or destination port

    9. displays all TCP packets that contain a certain term

    10. filters all HTTP GET and POST requests

    11. filter out certain types of protocols

    12. Can Wireshark capture passwords?

    13. Plain text network protocols

    14. Capture Insecure Connections (Net Cat)

    15. Capture FTP Passwords

    16. Extract files from FTP using Wireshark

    17. Capture HTTP Passwords

    18. Capture files (images) from HTTP traffic

    1. Our First Bash Script

    2. Variables

    3. If, Else, Elif Statements

    4. Loops

    5. Functions

About this course

  • $5.00
  • 72 lessons
  • 4.5 hours of video content