Course curriculum

    1. Ultimate Ethical Hacking from Zero To Hero

      FREE PREVIEW
    1. Ethical Hacking Essentials

      FREE PREVIEW
    2. The Ethical Hacking Process

      FREE PREVIEW
    3. The Advantages of Becoming an Ethical Hacker

    4. *NEW* Quiz

    1. Why Kali Linux ?

      FREE PREVIEW
    2. Booting Up Kali Linux

      FREE PREVIEW
    3. The Linux Filesystem

    4. Basic Linux Commands

    5. Managing Kali Linux Services

    6. Searching, Installing, and Removing Tools

    7. Kali Linux CLI - Environment Variables

    8. Kali Linux CLI - Bash History Command

    9. Kali Linux CLI - Piping and Redirection

    10. Kali Linux CLI - Text Searching and Manipulation

    11. Kali Linux CLI - Editing Files

    12. Kali Linux CLI - Comparing Files

    13. Kali Linux CLI - Managing Processes

    14. Kali Linux CLI - File and Command Monitoring

    15. Kali Linux CLI - Downloading Files

    16. Kali Linux CLI - Customizing the Bash Environment

    17. Netcat (nc) Essentials

    18. Bash Scripting - Our First Bash Script

    19. Bash Scripting - Variables

    20. Bash Scripting - If, Else, Elif Statements

    21. Bash Scripting - Loops

    22. Bash Scripting - Functions

    23. *NEW* Quiz

    1. Coming Soon

    1. Web Application Security Essentials

      FREE PREVIEW
    2. How Web Applications Work

    3. HTTP (Hypertext Transfer Protocol)

    4. What is DNS and How DNS works

    5. OWASP Top 10 Vulnerabilities

    6. Web Application Assessment Tools - DIRB

    7. Web Application Assessment Tools - Burp Suite

    8. Web Application Assessment Tools - Nikto

    9. *NEW* Quiz

    1. Networking Essentials

    2. OSI model

    3. What is Wireshark and why should you learn it?

    4. Install Wireshark

    5. WireShark Getting Started

    6. Sets a filter for any packet that has x.x.x.x as IP address

    7. Sets a conversation filter between two specific IP addresses

    8. Sets a filter to display all http and dns protocols

    9. Sets filters for any TCP packet with a specific source or destination port

    10. Displays all TCP packets that contain a certain term

    11. Filters all HTTP GET and POST requests

    12. Filter out certain types of protocols

    13. Can Wireshark capture passwords?

    14. Plain text network protocols

    15. Capture Insecure Connections (Net Cat)

    16. Capture FTP Passwords

    17. Extract files from FTP using Wireshark

    18. Capture HTTP Passwords

    19. Capture files (images) from HTTP traffic

About this course

  • $300.00
  • 152 lessons
  • 10 hours of video content