Full Ethical Hacking Course Volume 1
No Student Left Behind - Enjoy FREE
A Message From Fawad Bacha - Class Intro
How to use this course
Ethical Hacking Beginners Course (V1)
CyberPashto Subneting Guide.xlsx - Subnet Cheat Sheet
Introduction to course
Why Notekeeping is Importnant
Installing Greenshot and Keepnote
Networking - What is Ip Addresses
Networking - What is MAC Addresses
Networking - TCP UDP And The Three Way Handshak
Common Ports and Protocols
The OSI Model
Subnitting
Downloading and Installing Virtual box
Installing extensions
Kali Linux overview
creat update delete
users and privaleges
common networking commands
Installing Tools and Updating
Installing gedit
ipsweeper
Introduction to python
Maths in python
Method and variables
Functions in Python
Booleans And Relations
Conditional Statements
Lists ad tupples
Loops
Modules
Advance strings
Dictionaries
Building a port scanner
5 Stages of Ethical Hacking
Reconnaissance
Identifying Target
Finding email addresses of target
find Breached Credentials
Finding Sub domains
IdentifyingTechnologies of websites
BurpSuit Overview
Use of Google Dorks
Installing Kyoptrix
Scanning Kyoptrix
Enumerating HTTP-HTTPS PROTOCOLS
Enumerating HTPP-HTTPS PART 2
Enumerating SMB Port
Researching Potential Vulnerability
Downloading, Installing and Using Nessus
What is Reverse Shell and Bind shell
Hacking into KeyOptrix
Kioptrix OS
Books and Further Resources