Best Ethical Hacking and Cyber Security
-
Introduction to Hacking
-
Lecture 1.1What is Ethical hacking?
-
Lecture 1.2Types of hacker
-
Lecture 1.3VA/PT Introduction
-
Quiz 1.1Ethical Hacking30m
-
Lecture 1.4intro30m
-
-
Networking
-
Lecture 2.1Basic Introduction to Networking
-
Lecture 2.2IPv4/IPv6
-
Lecture 2.3Protocols
-
Lecture 2.4Topology
-
-
FootPrinting
-
Lecture 3.1Gathering Info
-
Lecture 3.2whois Info
-
Lecture 3.3Domain Info/Top-& low-Level Domain
-
Lecture 3.4registry registrant registrar
-
Lecture 3.5Buying Domain
-
Lecture 3.6Subdomain Scanner
-
-
Scanning
-
Lecture 4.1Nmap scan
-
Lecture 4.2Owasp zap scanner
-
-
Google Hacking
-
Lecture 5.1How googles works
-
Lecture 5.2using google search operators
-
Lecture 5.3Adminlogin.php
-
Lecture 5.4Hacking CCTV(Random)
-
Lecture 5.5Taking control of CCTV
-
Lecture 5.6Robots.txt
-
Lecture 5.7Countermeasures
-
-
Malware, Trojan & System Hacking
-
Lecture 6.1What is malware?
-
Lecture 6.2Creating virus
-
Lecture 6.3Infecting Systems
-
Lecture 6.4Taking control of system
-
Lecture 6.5Encrypting Virus/malware
-
Lecture 6.6Testing files for securing systems
-
Lecture 6.7Using Tools to remove virus/Malware
-
Lecture 6.8Securing Android Device
-
Lecture 6.9Countermeasures
-
Lecture 6.10Sniffing30m
-
-
Andriod Hacking
-
Lecture 7.1What is android?
-
Lecture 7.2Using tools on android Device
-
Lecture 7.3using metasploit to hack android device
-
Lecture 7.4Taking full control of android device
-
Lecture 7.5Accessing Files
-
Lecture 7.6Web cam recording ,web cam snap,webcam stream.
-
Lecture 7.7Voice Recording
-
Lecture 7.8Securing Android device
-
Lecture 7.9Countermeasure
-
Lecture 7.10Android Hacking30m
-
-
SQL Injection
-
Lecture 8.1What is SQL
-
Lecture 8.2Database Introduction
-
Lecture 8.3Finding if web is vulnerable or not
-
Lecture 8.4Gainning access to database
-
Lecture 8.5Finding admin info
-
Lecture 8.6Finding admin page and Logging in successfully
-
Lecture 8.7Countermeasure
-
Lecture 8.8sqli30m
-
-
VPN, Hiding Identity ,Dark web
-
Lecture 9.1What is VPN?
-
Lecture 9.2How to Change your location
-
Lecture 9.3Tools to used
-
Lecture 9.4Accessing Dark Web
-
Lecture 9.5Using to Browser
-
Lecture 9.6Countermeasure
-
-
Cross Site Scripting
-
Lecture 10.1what is Xss
-
Lecture 10.2types of Xss
-
Lecture 10.3Is it vulnerble?
-
Lecture 10.4Redirecting
-
Lecture 10.5Getting access of cookies
-
Lecture 10.6Login using cookies
-
Lecture 10.7Countermeasure
-
Lecture 10.8cross site Scripting30m
-
-
Social Media Hacking
-
Lecture 11.1What is social media hacking
-
Lecture 11.2Social Engineering
-
Lecture 11.3Phishing
-
Lecture 11.4How to Detect phishing
-
Lecture 11.5Countermeasures
-
Lecture 11.6Social media hacking30m
-
-
Email Security
-
Lecture 12.1How E-Mail Works
-
Lecture 12.2Sending Fake E-Mail
-
Lecture 12.3Verifying Mail
-
Lecture 12.4Mail Client Sniffers
-
Lecture 12.5Countermeasures
-
-
Password Cracking
-
Lecture 13.1What is Brute force ,Dictionary Attack
-
Lecture 13.2Protecting PDF Files
-
Lecture 13.3Breaking Pdf Files
-
Lecture 13.4Countermeasures
-
Lecture 13.5Password Cracking30m
-
-
Cryptography and Stenography
-
Lecture 14.1What is Cryptography and Stenography?
-
Lecture 14.2MD5
-
Lecture 14.3Using tools
-
Lecture 14.4Cracking Securing hash
-
Lecture 14.5Stenography tools
-
Lecture 14.6Countermeasures
-
-
Physical Security
-
Lecture 15.1What is Physical Security
-
Lecture 15.2Tools to use
-
Lecture 15.3Countermeasure
-
-
Wireless Hacking
-
Lecture 16.1What is WEP/WPA/WPA2
-
Lecture 16.2Tools to analyse Network
-
Lecture 16.3Handshake
-
Lecture 16.4Hacking Wi-FI
-
Lecture 16.5Taking control over wifi
-
Lecture 16.6Countermeasures
-
Lecture 16.7WiFi hacking30m
-
-
Cyber Forensics
-
Lecture 17.1What is Forensics?
-
Lecture 17.2Recovering lost data
-
Lecture 17.3Tracking users on website
-
Lecture 17.4Checking logs
-
Lecture 17.5Analyzing the Logs
-
Lecture 17.6Computer Forensics30m
-