Ethical Hacking Essentials Course

Module 1: Mastering Kali Linux

  • E1: Introduction and Installation
  • E2: Navigating the Kali Interface
  • E3: Terminal Commands Made Easy
  • E4: Creating a Sudo User
  • E5: File Management & Permissions
Module 2: Achieving Kali Anonymity
  • E6: VPN, Proxy Chains, and Tor Services
Module 3: Passive Information Gathering
  • E7: Fundamentals of Reconnaissance
  • E8: Tools: Whois & Netcraft
  • E9: Website Recon & Footprinting
  • E10: DNS Recon & Subdomain Enumeration
  • E11: Google Dorking Techniques
Module 4: Active Information Gathering
  • E12: Host Discovery & ARP Protocols with Nmap
  • E13: Port Scanning Essentials
  • E14: Advanced Scanning Techniques
Module 5: Vulnerability Scanning
  • E15: Installing & Setting up Nessus
  • E16: Nessus Tool Walkthrough
Module 6: The Metasploit Framework
  • E17: Introduction to Metasploit
  • E18: Auxiliaries Overview
  • E19: Locating Public Exploits (CVE)
  • E20: Working with Payloads
  • E21: Meterpreter Session Commands
  • E22: Privilege Escalation & Post-Exploitation
  • E23: Persistence Techniques
  • E24: External Pen Testing (Android)
  • E25: GUI Metasploit with Armitage
Module 7: Social Engineering
  • E26: Basics of Social Engineering
  • E27: Apache & Simple HTTP Servers
  • E28: Social Engineering Toolkit (SET)
  • E29: Using Short URLs & QR Codes
  • E30: Exploring the Beef Platform
Module 8: Man-in-the-Middle (MITM) Attacks
  • E31: ARP Poisoning & DNS Spoofing
Module 9: Wi-Fi Attacks
  • E32: Router Walkthrough & Module Overview
  • E33: Indoor Wi-Fi Hacking Essentials
  • E34: Network Adapter Setup
  • E35: Wordlists for Password Cracking
  • E36: 4-Way Handshake Attacks
  • E37: Automated Wi-Fi Hacking Tools
  • E38: WPS Attacks
  • E39: Evil Twin Attack
Module 10: Password Cracking
  • E40: Cracking with John the Ripper
  • E41: Advanced Hashcat Techniques
  • E42: Brute Force Attacks with Hydra

DIFFICULTY    NOVOICE

DURATION      32 HOURS

SECTIONS      12

EPISODES      42

120$