DIFFICULTY PROFESSIONAL
DURATION 22 HOURS
SECTIONS 16
EPISODES 52
E1- Introduction to Cyber Security
E2- Linux Essentials & Keyboard Shortcuts
E3-File Permission
E4-Linux File Management
E5-Mannaging Process and Downloading Files
E6-Piping,Redirecting ,Text Searching and Manipulation
E7-Netcat
E8-Socat
E9-Powershell
E10-Powercat
E11-Advanced Wireshark
E12-Tactical Wireshark
E13-Introduction-Variables-Arguments
E14-If-else-Elif-Logical operations
E15-Loops-Function
E16-Practical Exercise (Creating our own Tool)
E17-DNS Enumeration
E18-NFS,SMTP,SNMP Enumeration
E19-Nmap TCP-UDP Port Scanning
E20-NSE,OS,Service,Enumeration,Masscan
E21-SMB,Netbios Enumeration
E22-TCP-UDP Port Scanning
E23-Nessus Installation
E24-Nessus Walkthrough
E25-Introduction to Web app
E26-Web app Essentials
E27-Web app Enumeration & Assessment Tools (Fuzzing)
E28-Assessment Tools (Test Vulnerabilities)
E29-Zap Proxy & Burp Suit
E30-Reflected XSS
E31-Stored XSS
E32-Introduction to SQL injection
E33- SQL Exploitation …
E34-Attacks with social Engineering
Module 10- Public Exploits
E35- Locating Public Exploits
E36- Exploiting Public Exploits
E37- Manual Privilege Escalation
E38- Windows Privilege Escalation (Experimental labs)
E39- Linux Privilege Escalation (Experimental Labs)
E40-Introducction to password Cracking
E41-Sam and Shadow Hash Folders
Module 13- Port Redirection and Tunneling
E42- SSH Tunneling and Port Forwarding
E43- Introduction-Lab Installation (Server and Managing Domain Controller)
E44- Enumeration and Authentication (NTLM & Kerberos)
E45-Attacks and Full Control
E46- Introductions-Auxiliary
E47-Exploits-Payloads
E48-Post Exploitation-Metasploit Automation
E49- Introduction-Installation-Overview
E50- Privilege Escalation- Modules
E51- Persistent Mode – Interaction with Metasploit
E52- StarKiller (GUI Empire PowerShell