Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Ethical Hacking Mastery: CSEH + CEH Certification
1. Introduction and First Steps
1. Being an Ethical Hacker (1:48)
2. Operating System
2. File Allocation Tables (12:33)
1. Mastering Boot Starting Firmware Interfaces (15:36)
3. Creating our ethical hacking lab
1. Creating our Ethical Hacking Lab (2:39)
2. Getting Started (7:42)
3. Installing Virtual Machines (8:25)
4. Installing Kali (7:24)
5. Installing Metasploitable (7:49)
4. Introduction to Networking
1. What is network protocol and what it does (4:16)
2. Layers of TCPIP Model (4:10)
3. How emails sent and received over internet (2:28)
4. PDU Explained (6:18)
5. Basic Use of Switch and Data Transmission (5:40)
6. 2 Networks Talking with Router in Middle (4:49)
5. Bypassing Network Access Control
1. Introduction to Section and Fundamentals of Media Control Filtering (4:51)
2. Linux WAP and Bypassing Mac Filtering (6:27)
6. Cybersecurity - Beginning
1. Introduction to Passive Information Gathering (2:28)
2. What is Cybercrime (1:42)
3. Three Types of Cybercrime (1:57)
4. Examples to Cybercrime (6:59)
5. What is Cyber Security (6:50)
6. Firewalls (11:53)
7. Windows Firewall (9:10)
8. DMZ (7:06)
9. VPN
7. Vulnerability Assassment
1. Introduction to Section (1:29)
2. Why is VulnScanning is BAD
8. OSINT
1. Introduction to Passive Information Gathering (2:28)
2. Differences Between Recon and Footprinting (5:42)
3. Understanding Passive Information Gathering and OSINT (6:15)
4. Introduction to OSINT (2:46)
5. Principles of Recon (3:08)
6. Offensive OSINT (5:17)
7. Using SBLSTR for Finding Subdomains (3:42)
8. USUFY as Osint Tool (6:19)
9. Finding Deleted WebPages (3:22)
10. THRVSTR as Osint Tool (6:00)
11. Reverse Image Search (3:40)
12. GHDB (6:29)
13. GHDB Part 2 (10:09)
9. Storage Media - Module 1
1. The History of Storage Media (6:15)
2. Magnetic Tape Drives (2:00)
3. Floppy Disks (1:12)
4. Optical Storage Media (1:37)
5. DVD (2:20)
6. Blu-ray (4:01)
10. Storage Media - Module 2
1. Flash Storage Media (2:31)
2. USB Flash Drives (1:19)
3. Flash Memory Card (4:17)
11. Storage Media - Module 3
1. Hard Disk Drives (HDD) (5:42)
2. Solid State Drives (SSD) (2:57)
12. Starting with Basic Linux Commands - CSEH
1. Understanding Linux Commands and Pipes (7:24)
2. What is a Command (3:31)
3. Pipeline example -1 (10:39)
4. Weird LS Command (3:42)
5. Different Linux Commands using with Pipe (11:22)
13. Starting with Linux Terminal - CSEH
1. Understanding key concepts (6:54)
2. Finding Helpful manuals (6:51)
3. Linux Directories (5:41)
4. Linux Directories - Part 2 (5:41)
14. Starting with Linux Shell - CSEH
1. The bridge between You and Shell (7:27)
15. Exploring the Linux System - CSEH
1. LS Command (2:27)
2. RD vs APD (9:05)
3. Filtering LS (7:43)
4. CP Command (6:36)
5. Tab Auto-completion (3:31)
6. SYM AND HRD Link Files (12:06)
7. Manipulating Files (6:19)
16. Starting with Linux Shell - CSEH
1. Introduction to Shell and Expansion (6:56)
2. Arithmetic Expressions with Shell (4:16)
3. Automating Folder Creation with Shell (8:16)
4. Quoting in Shell (9:33)
17. Permissions - CSEH
1. Introduction to Permissions in Linux (4:54)
2. Differences between UID, GID and Shadow (6:18)
3. File and Dir Permissions (8:30)
4. Examples with File Permissions (4:30)
5. After this video you-ll understand all LINUX Permissions (19:46)
6. Chmod (12:45)
18. Processes in Linux - CSEH
1. Fundamentals of Processes in System (6:55)
2. The Magic with PS Aux Command (7:23)
3. The Magic with TOP Command (8:12)
4. Foreground and Background Processes (7:58)
5. From Background to Foreground (4:20)
6. The Tutorial with Linux Process Signals (11:33)
19. Packet Management Systems in Linux - CSEH
1. Introduction to Packet Management Systems (4:43)
2. Why we need package management tools (6:14)
3. Package Management in Linux - Final (8:40)
20. Network Security Cyber Security
1. The main goal and importance of Network Security (2:19)
2. 3 Main Ways to Make your Network Stronger (4:36)
3. A Chain is no stronger than its weakest link (2:44)
4. What is Network Maps in Cyber Security (4:05)
21. Network Security Concepts
1. Main Guidelines for Network Security (5:54)
2. Analysis to Consider and Action Priority (5:16)
3. Threat Modeling (8:50)
22. Getting Started with Networking - CSEH
1. Trcrt command (8:25)
2. Networking with Linux (7:12)
23. Linux - File System
1. Linux - Filesystem Part 1 (10:51)
2. Linux - Filesystem Part 2 (16:23)
3. Linux - Logging and Remaining Stealthy (24:34)
4. Linux Creating our own Web Server (13:59)
24. Linux - Working with Archive files
1. Linux - Working With Archive Files 1 (13:55)
2. Linux - Working With Archive Files 2 (14:44)
25. Linux - Working With Files and Permissions
1. Linux Working With Files - Part 1 (10:24)
2. Linux Working With Files - Part 2 (7:52)
26. Linux - Working with Processes
1. Working with Processes - Part 1 (6:09)
2. Linux Filtering Processes (4:54)
3. Working With Processes - Part 2 (14:42)
4. Working with Processes - Part 3 (10:30)
27. Linux - Working With USER Enviroment Variables
1. User Enviroment Variable Introduction (6:57)
2. Changing Enviroment Variables (5:51)
3. Editing and Creating New Variables (11:39)
28. Linux - Networking
1. Fundamentals of Linux Introduction (4:54)
2. Dealing With Files (13:44)
3. Linux Network Manipulation - Part 1 (12:56)
4. Linux Mac Adress Spoofing (6:30)
5. Changing DNS in Linux (11:58)
6. Manipulating Hosts File (5:07)
29. Linux - Software Control
1. Linux APT Part 1 (6:42)
2. Linux APT Part 2 (14:00)
30. Networking
1. TCP-IP - Part 1 (9:05)
2. TCP-IP - Part 2 (8:11)
3. TCP-IP - Part 3 (9:29)
4. TCP-IP - Part 4 (8:31)
5. TCP-IP - Part 5 (5:19)
31. Wireshark Ninja - Fundamentals
1. What is Wireshark and What you-ll learn in this section (1:41)
2. Introduction to Interface and Important Shortcuts (10:44)
3. The Importance of Promiscuous Mode (4:37)
4. Displaying the Captured Data and Plugins (8:27)
32. Networking - Capturing Network Traffic
1. Passive Capture and Wireshark (11:20)
2. Active and Passive Capture (11:40)
33. Starting with Wireshark
1. Unlocking the Secrets of Network Traffic Unleash the Power of Wireshark! (13:19)
2. Power Trio Exploring IDS, ACLs, and Firewalls for Network Securiy (3:32)
3. Wireshark-s Capture Power Dive into Live Traffic Analysis with Live Filters (12:29)
4. Decoding Signal Types Unveiling the Language of Communication (5:28)
34. Advanced Networking Topics for Wireshark
1. Beginning to use Wireshark Display Filters (10:19)
2. Learning TCP States (3:56)
35. Android Hacking - Mobile Hacking - IOS Hacking
1. The Anatomy of Android System Architecture (8:52)
36. Information Gathering
1. Introduction to Information Gathering (5:11)
2. DNS Info Gathering (8:45)
3. Maltego - Part 1 (12:30)
4. Reconnaissance and Footprinting (9:27)
37. Starting Practical with Nmap
1. Nmap-s Network Scanning Capabilities (7:07)
2. Beginning to Using NSE Scripts (8:49)
3. Port scanning on Servers (6:44)
4. Port scanning techniques and Interface Selection (8:36)
5. Targeting and Excluding Networks with CIDR (15:52)
6. Nmap Operating System Detection (10:13)
7. Random Port Scanning and Legal Issues (6:46)
38. Being Real Nmap Pro
1. Unique Techniques that you-ll learn in this section (9:00)
2. Advanced TCP ACK and SYN Scan (12:29)
3. Advanced ICMP (10:04)
39. Reconnaissance with Nmap
1. Introduction to Reconnaissance (8:22)
2. IP Geolocation and WhoIS using Nmap (17:18)
3. Graphical Traceroute (9:26)
40. Scanning Web Servers with Nmap
1. Explanation and What Skills you-ll earn in this section (9:43)
2. Scanning HTTP Methods and Potential Risks (15:26)
3. Searching for Digital Gold in the Web Server Maze (13:52)
41. Detecting Firewalls
1. Web Application Firewall and IPS Detection (17:03)
42. The Importance of Programming and Thinking in Hacking
1. Why C++ Is Important for Ethical Hacking (1:17)
2. A1 - CPP Newlines,Tabs and Spaces (8:13)
3. A1 - Initializers in CPP (11:07)
4. A2 - CPP Writing Styles (6:33)
5. A3 - Statements and Expressions, RVALUE and LVALUE (9:06)
6. A4 - Comma (4:29)
7. A5 - Types and Variables (11:24)
8. A6 - Literals in CPP (4:57)
9. A7 - Defining Constants (5:56)
10. A8 - Const Expressions (4:03)
11. Beginning to Pointers (5:30)
12. A11 - Namespaces in CPP (11:59)
13. A12 - Scoping Variables and Static Keyword (20:11)
14. Conditional Statements (9:11)
43. Types and Conditional Statements in C++
1. A1 - Types in CPP - Binary, Octal and Hex (10:20)
2. A2 - Floating Point types in CPP - Float, Double, Long Double (12:28)
3. A3 - Char types in CPP (11:45)
4. A4 - Enum Types (9:28)
5. A4 - Boolean Types and Comparison Operators (13:27)
6. A5 - Void Type and Void Function (3:32)
7. A6 - 1 Operators 101 (13:36)
8. A7 - Default Values in CPP (9:05)
9. A1 - Switch Statement with ENUM (13:26)
10. A2 - Conditional Statements in CPP (16:43)
11. A3 - For Loop (8:31)
12. A4 - Continue Keyword (2:35)
13. A5 - Do-While Loop (3:47)
14. A6 - Goto (2:26)
44. Classes and Pointers in C++
1. A1 - POD Data Classes (3:48)
2. A2 - Unions in CPP (6:28)
3. A3 - Methods in Struct (5:10)
4. A4 - Access Controls in CPP (6:28)
5. A5 - Classes and Initializing Class Member (4:18)
6. A6 - Constructors (3:35)
7. A7 - Destructors in CPP (1:50)
8. A8 - Initializers in CPP (11:07)
9. 11 - Pointers in CPP (13:09)
10. A1 - C++ Beginning to Pointers
11. A2 - Dereference Operator in CPP (10:11)
12. A3 - Pointers and Arrays (10:47)
13. B2 - nullptr (3:21)
14. B3 - Pointer arithmetic in CPP (9:03)
15. C1 - Arrays out of bounds and Deallocating Pointers= (5:43)
16. C2 - Consts and Casts with Pointers (7:38)
17. C3 - Allocating Memory (4:27)
18. C4 - Allocating memory as arrays (2:56)
19. C5 - Lifetime of Memory
45. STL, References, Pointers in C++
1. A1 - STL, Vectors and Arrays
2. A1 - References (6:35)
3. A2 - Example Project With References
4. A3 - Code Example with AUTO, TUPLE and FOR LOOP (14:51)
5. A4 - Range Based for Loop
6. A1 - Pointers in Practice
7. A2 - Pointers in Practice - Part 2 (9:56)
8. A3 - Pointers in Practice - Part 3 (3:50)
9. A4- Pointers in Practice - Part 4 (4:33)
46. Functions in C++
1. A1 - Introduction to Functions (7:36)
2. A2 - Functions - Part 1 (4:51)
3. A3 - Functions - Part 2 (7:50)
4. A4 - Functions - Part 3 (7:04)
5. A5 - Functions - Part 4 (7:17)
6. A6 - Functions - Part 5 (6:39)
7. A7 - Functions - Part 6 (11:12)
8. A8 - Functions - Part 7 (4:03)
47. Data Structures in C++
1. A1 - Introduction to Basic CPP Programming (8:11)
2. A2 - Creating Random Card Generator Using Enum and rand (14:18)
3. A3 - Developing main Function and using static_cast (8:28)
4. A1 - Introduction to ADT (2:54)
5. A2 - Creating ADT Class and using Constructors (10:46)
6. A3 - Virtual Methods and Overriding from Class (7:35)
7. A4 - Controlling Copy Operations with ADT (4:50)
8. A1 - Starting with Templates (6:53)
9. A2 - Class Templates in CPP (15:12)
10. A1 - Introduction to STL (3:27)
11. A2 - Algorithm Analysis (10:38)
12. A3 - Scenario Analysis (7:22)
13. A4 - Developing Main (2:02)
14. A5 - Factorial Method (3:46)
15. A1 - Understanding Arrays (7:13)
16. A2 - Manipulating Arrays (8:16)
17. A3 - Starting with Array Pointers (8:29)
18. A4 - Pointer Increment vs Array Indexing (6:24)
19. A1 - Creating List ADT (9:56)
20. A2 - Developing Get and Insert Methods (7:18)
21. A3 - Developing Search and Remove Methods (9:09)
22. A4 - Testing ADT List (14:19)
23. A1 - Node and Chaining Example (13:05)
24. A2 - Creating and Chaining nodes with Different data types (9:54)
25. A1 - Creating Custom Linked List (11:50)
26. A2 - Get Method (5:48)
27. A3 - Developing InsertHead, InsertTail and Insert Methods (19:08)
28. A4 - Developing Search Operation (7:29)
29. A4 - Removing Items (15:23)
48. SQL Training for Ethical Hacking - Introduction
1. Preparing Environment in 16 Mins (16:34)
2. A2 - Starting with PostgreSQL (10:13)
3. A3 - Customizing pgAdmin (2:20)
4. A4 - Creating our First database and Adding Tables (10:45)
5. A5 - Creating our First database and Adding Tables Part 2 (5:20)
49. SQL for Ethical Hacking Creating our first Database and Table
1. A1 - Adding Data into Tables (18:29)
2. A2 - Starting with Select Keyword (10:20)
3. A3 - Order by (7:57)
4. A4 - Magic with WHERE and Operators (13:40)
5. A5 - Learning Logical Operation in SQL (9:07)
50. SQL for Ethical Hacking Datatypes in SQL
1. A1 - Basic Datatypes in SQL (8:38)
2. A2 - Char and Text Types in Practice and Exporting TXT Files (10:56)
3. A3 - Integers in SQL (5:38)
4. A4 - Other ways to use INCREMENT (9:09)
5. A5 - Floating Point Numbers and Their Disadvantages (17:39)
51. Ethical Hacking for SQL Dates and Times in SQL
1. A1 - UTC, Dates and Times in SQL (14:06)
2. A2 - Timestamp with Timezone Interval (2:32)
52. Learning Python for Ethical Hacking - Variables and Strings in Python
1. First Steps in Python (4:30)
2. Defining Variable Names (3:34)
3. Misspelling and Finding Errors in Variable Names (4:17)
4. String Manipulation (7:23)
5. Format String in Python (5:23)
6. String Manipulation Functions (10:18)
7. String Manipulation Functions - Part 2 (7:03)
53. Learning Python for Ethical Hacking - Numbers in Python
1. Integers and Floats in Python (5:52)
2. Floats and Constants in Python (4:27)
3. Comments in Kotlin (3:30)
54. Learning Python for Ethical Hacking - Lists in Python
1. List Indexes in Python (12:28)
2. F Strings with Lists (2:13)
3. Appending to Lists (12:48)
4. Removing an Item from Specific Index (10:48)
5. Popping an Item from List (7:12)
6. Del vs Pop at Removing Items (1:37)
7. Removing Method (3:53)
8. More List Methods (8:32)
9. Preparing for Next Section (0:40)
55. Python for Ethical Hacking - Looping in Python
1. Understanding Philosophy behind loop (8:30)
2. Loops and Indentations (6:33)
3. Possible Errors with Loops (7:47)
4. Using Range and Loops Together (10:42)
5. Slices in with Lists and Loops (7:16)
6. A6 - Using Slices vs Vars for Copying List (7:30)
7. Tuples vs Lists in Python (7:38)
56. If, Else, Else If
1. Introduction to Conditions (3:26)
2. If Else with Example (7:03)
3. If Statement and Introduction to Expressions (10:17)
4. If, Elif, Else (9:47)
57. Creating Hacking Tools with Python from Zero - Network
1. Installing SCPY (5:48)
2. Basic TCP Client for Beginners (6:20)
58. Mastering Metasploit
1. Installing Metasploit (9:58)
2. Metasploit Basics - Part 1 (16:08)
3. Metasploit Basics - Part 2 (17:06)
4. Metasploit Basics - Part 3 (10:29)
5. Running NMAP in Metasploit and Port Scanning (11:18)
6. Metasploit Passive Information Gathering - Part 1 (7:34)
7. Metasploit - Finding Subdomains (4:27)
8. Metasploit - TCP Port Scanning (8:52)
9. Metasploit - TCP SYN Port Scanning (8:04)
10. Metasploit - Passive Information Gathering - Part 2 (12:08)
11. Metasploit - Version Detection (9:14)
12. DONE (0:10)
59. Mastering Volatility Framework for Ethical Hacking and Digital Forensics
1. Introduction to Volatility Framework (5:59)
2. Downloading and Installing Volatility (3:42)
3. Downloading and Unrar Sample Images for Volatility (13:43)
4. Volatility Plugins - Part 1 (5:25)
5. Volatility Plugins Part 2 - Network Analysis (6:54)
6. Network Analysis (5:15)
7. DLL Analysis (11:02)
8. Volatility Registry Analysis (7:50)
9. Password Extraction and Timeliner Plugin (4:54)
10. Volatility Plugins Part 3 (14:40)
11. Analysis of the Malware Using Volatility (5:16)
12. DLL and Memory Dump using Volatility (11:48)
13. EXE Dump and Last lecture of section (5:46)
Teach online with
15. A1 - Understanding Arrays
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock