This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The Red team: master the art of Ethical Hacking
Introduction
Course introduction
What you will be capable after you finish this course? (0:38)
The Ethics and Law of Cyber Security.
Reimagining Analog and Digital Devices:
Appreciating the Greatest Minds in History.
Reimagining Electricity.
Understanding Analog Devices.
Representation and Symbolism using binary digit Explained.
Comparing the Computer and the Human brain.
How Computers and Digital Devices Function.
Experiments in Transmitting Sound, Images, and Video.
Creating Your Virtual Lab: Unleashing the Power of Imagination.
Introduction to Virtualization and the Need for a Virtual Lab: (4:47)
Installing VirtualBox on Windows: (3:55)
Installing Kali Linux on VirtualBox:
Mastering Kali Linux and Other Linux Distributions: A Comprehensive Guide
List of softwares on Kali Linux?
What is the terminal and how to use it?
Basic Kali Linux command?
Networking
What is Network?
What is Network Hacking?
what is firewall?
what is encryption?
what is Network adapter?
What is MAC address?
What are the type of wireless Network Modes?
What types of attackers perform before we connect to the network?
What is packet sniffing basics?
what are the Wifi bands or frequencies?
How to packet sniffing
Deauthentication attack
Gain Access
Summary and Wrap-up
Post connection Attacks
Privilage escalation
Malware development
Metasploit
Gain access to Server Side
Server side
Gain Access Client Side Attacks
Mobile
Gain access to Outside the local area network.
Public IP
Post Exploitation
run
Website Hacking
website
Social engineering
Introduction of social engineering
What is emotion?
what is language?
the greatest misconception thought and reality.
Belief (mind's software)
Human psychology
Introvert and extrovert
Emotional Intelligence
OSINT
How you easily to be manipulated
society (the block chain)
Privacy and anonymity
what is privacy and anonymity?
How to navigate dark web using tor browser?
virtual private network (VPN)
Tali, the most secure operating system
PGP encryption
what are crypto currency and how to use it??
Python Programming
Introduction
Setup environment
Basic
Advance
Algorism
Keylogger
Reverse shell
Artificial intelligence
what is artificial intelligence?
proof of concept how AI work?
How to use the most recent AI tool for your advantage?
What is next?
What are the most respected IT certification in cybersecurity?
How to generate income beside working as a freelancer?
What you should focus the the most in your future journey?
Installing VirtualBox on Windows:
Complete and Continue