Skip to content
Home
Courses
Services
Blog
Store
Contact Us
x
Close Menu
Search
Ethical Hacking Essentials Course
Module 1: Mastering Kali Linux
E1: Introduction and Installation
E2: Navigatin
g the Kali Interface
E3: Terminal Commands Made Easy
E4: Creating a Sudo User
E5: File Management & Permissions
Module 2: Achieving Kali Anonymity
E6: VPN, Proxy Chains, and Tor Services
Module 3: Passive Information Gathering
E7: Fundamentals of Reconnaissance
E8: Tools: Whois & Netcraft
E9: Website Recon & Footprinting
E10: DNS Recon & Subdomain Enumeration
E11: Google Dorking Techniques
Module 4: Active Information Gathering
E12: Host Discovery & ARP Protocols with Nmap
E13: Port Scanning Essentials
E14: Advanced Scanning Techniques
Module 5: Vulnerability Scanning
E15: Installing & Setting up Nessus
E16: Nessus Tool Walkthrough
Module 6: The Metasploit Framework
E17: Introduction to Metasploit
E18: Auxiliaries Overview
E19: Locating Public Exploits (CVE)
E20: Working with Payloads
E21: Meterpreter Session Commands
E22: Privilege Escalation & Post-Exploitation
E23: Persistence Techniques
E24: External Pen Testing (Android)
E25: GUI Metasploit with Armitage
Module 7: Social Engineering
E26: Basics of Social Engineering
E27: Apache & Simple HTTP Servers
E28: Social Engineering Toolkit (SET)
E29: Using Short URLs & QR Codes
E30: Exploring the Beef Platform
Module 8: Man-in-the-Middle (MITM) Attacks
E31: ARP Poisoning & DNS Spoofing
Module 9: Wi-Fi Attacks
E32: Router Walkthrough & Module Overview
E33: Indoor Wi-Fi Hacking Essentials
E34: Network Adapter Setup
E35: Wordlists for Password Cracking
E36: 4-Way Handshake Attacks
E37: Automated Wi-Fi Hacking Tools
E38: WPS Attacks
E39: Evil Twin Attack
Module 10: Password Cracking
E40: Cracking with John the Ripper
E41: Advanced Hashcat Techniques
E42: Brute Force Attacks with Hydra
DIFFICULTY NOVOICE
DURATION 32 HOURS
SECTIONS 12
EPISODES 42
120$
GET ACCESS