Ethical Hacking And Pentest

After completion of this course, the students will have a fundamental background in ethical hacking and would be able to pursue Certified Ethical Hacker (CEH) certification.

Created by Last updated Mon, 30-Nov-2020
Curriculum for this course
136 Lessons 23:48:26 Times
  • 1. Course Overview P1 00:03:35
  • 2. Course Overview P2 00:08:07
  • 3. Course Overview P3 00:11:17
  • 1. Introduction to Cybersecurity and Ethical Hacking P1 00:10:08
  • 2. Introduction to Cybersecurity and Ethical Hacking P2 00:11:17
  • 3. Introduction to Cybersecurity and Ethical Hacking P3 00:08:00
  • 1. Types of Hacker and Misconceptions P1 00:18:39
  • 2. Types of Hacker and Misconceptions P2 00:10:26
  • 3. Types of Hacker and Misconceptions P3 00:10:58
  • 4. Types of Hacker and Misconceptions P4 00:20:28
  • 1. Vulnerability Assessment Vs Penetration Testing P1 00:12:10
  • 2. Vulnerability Assessment Vs Penetration Testing P2 00:10:03
  • 1. Types of Penetration Testing 00:10:51
  • 1. Areas of Penetration Testing P1 00:09:49
  • 2. Areas of Penetration Testing P2 00:09:49
  • 3. Areas of Penetration Testing P3 00:09:55
  • 4. Areas of Penetration Testing P4 00:10:35
  • 5. Areas of Penetration Testing P5 00:10:20
  • 6. Areas of Penetration Testing P6 00:09:38
  • 1. Hacker Mindset and Skill Requirements P1 00:09:59
  • 2. Hacker Mindset and Skill Requirements P2 00:10:40
  • 3. Hacker Mindset and Skill Requirements P3 00:10:56
  • 1. Hacking Terminologies and Definitions P1 00:10:21
  • 2. Hacking Terminologies and Definitions P2 00:10:08
  • 3. Hacking Terminologies and Definitions P3 00:10:03
  • 4. Hacking Terminologies and Definitions P4 00:10:14
  • 5. Hacking Terminologies and Definitions P5 00:10:37
  • 6. Hacking Terminologies and Definitions P6 00:10:23
  • 7. Hacking Terminologies and Definitions P7 00:10:21
  • 8. Hacking Terminologies and Definitions P8 00:10:07
  • 9. Hacking Terminologies and Definitions P9 00:10:28
  • 10. Hacking Terminologies and Definions P10 00:09:08
  • 11. Hacking Terminologies and Definitions P11 00:09:57
  • 12. Hacking Terminologies and Definitions P12 00:10:38
  • 13. Hacking Terminologies and Definitions P13 00:10:09
  • 14. Hacking Terminologies and Definitions P14 00:10:07
  • 15. Hacking Terminologies and Definitions P15 00:10:51
  • 1. Malware Threats and Cyber Kill Chain P1 00:10:12
  • 2. Malware Threats and Cyber Kill Chain P2 00:10:08
  • 3. Malware Threats and Cyber Kill Chain P3 00:10:08
  • 4. Malware Threats and Cyber Kill Chain P4 00:10:32
  • 5. Malware Threats and Cyber Kill Chain P5 00:10:32
  • 6. Malware Threats and Cyber Kill Chain P6 00:10:24
  • 1. Hacking Phases and Methodologies P1 00:10:06
  • 2. Hacking Phases and Methodologies P2 00:10:07
  • 3. Hacking Phases and Methodologies P3 00:09:55
  • 4. Hacking Phases and Methodologies P4 00:10:24
  • 5. Hacking Phases and Methodologies P5 00:10:28
  • 6. Hacking Phases and Methodologies P6 00:10:05
  • 1. Kali Linux Basics and Tools P1 00:10:03
  • 2. Kali Linux Basics and Tools P2 00:09:53
  • 3. Kali Linux Basics and Tools P3 00:10:17
  • 4. Kali Linux Basics and Tools P4 00:09:38
  • 5. Kali Linux Basics and Tools P5 00:10:22
  • 6. Kali Linux Basics and Tools P6 00:10:24
  • 8. Kali Linux Basics and Tools P8 00:10:23
  • 7. Kali Linux Basics and Tools P7 00:10:17
  • 9. Kali Linux Basics and Tools P9 00:10:05
  • 10. Kali Linux Basics and Tools P10 00:10:21
  • 11. Kali Linux Basics and Tools P11 00:10:17
  • 13. Kali Linux Basics and Tools P13 00:10:14
  • 12. Kali Linux Basics and Tools P12 00:10:07
  • 14. Kali Linux Basics and Tools P14 00:10:15
  • 15. Kali Linux Basics and Tools P15 00:10:04
  • 16. Kali Linux Basics and Tools P16 00:10:02
  • 17. Kali Linux Basics and Tools P17 00:10:04
  • 18. Kali Linux Basics and Tools P18 00:10:20
  • 19. Kali Linux Basics and Tools P19 00:10:22
  • 20. Kali Linux Basics and Tools P20 00:11:03
  • 21. Kali Linux Basics and Tools P21 00:10:28
  • 22. Kali Linux Basics and Tools P22 00:10:27
  • 23. Kali Linux Basics and Tools P23 00:10:02
  • 24. Kali Linux Basics and Tools P24 00:10:51
  • 25. Kali Linux Basics and Tools P25 00:10:13
  • 26. Kali Linux Basics and Tools P26 00:10:20
  • 27. Kali Linux Basics and Tools P27 00:09:27
  • 28. Kali Linux Basics and Tools P28 00:10:17
  • 29. Kali Linux Basics and Tools P29 00:10:20
  • 30. Kali Linux Basics and Tools P30 00:10:27
  • 31. Kali Linux Basics and Tools P31 00:10:24
  • 32. Kali Linux Basics and Tools P32 00:10:10
  • 33. Kali Linux Basics and Tools P33 00:10:14
  • 34. Kali Linux Basics and Tools P34 00:10:38
  • 35. Kali Linux Basics and Tools P35 00:10:28
  • 36. Kali Linux Basics and Tools P36 00:10:19
  • 37. Kali Linux Basics and Tools P37 00:11:02
  • 38. Kali Linux Basics and Tools P38 00:10:03
  • 1. Common Hacking Tools P1 00:10:05
  • 2. Common Hacking Tools P2 00:10:09
  • 3. Common Hacking Tools P3 00:10:03
  • 4. Common Hacking Tools P4 00:10:00
  • 5. Common Hacking Tools P5 00:10:11
  • 6. Common Hacking Tools P6 00:10:49
  • 7. Common Hacking Tools P7 00:09:58
  • 8. Common Hacking Tools P8 00:10:12
  • 9. Common Hacking Tools P9 00:10:10
  • 10. Common Hacking Tools P10 00:10:45
  • 12. Common Hacking Tools P12 00:09:46
  • 11. Common Hacking Tools P11 00:09:24
  • 13. Common Hacking Tools P13 00:10:05
  • 14. Common Hacking Tools P14 00:10:27
  • 15. Common Hacking Tools P15 00:10:02
  • 16. Common Hacking Tools P16 00:10:43
  • 17. Common Hacking Tools P17 00:09:55
  • 18. Common Hacking Tools P18 00:10:01
  • 19. Common Hacking Tools P19 00:10:13
  • 20. Common Hacking Tools P20 00:09:51
  • 21. Common Hacking Tools P21 00:10:51
  • 1. Pre-Exploitation Lab P1 00:10:26
  • 2. Pre-Exploitation Lab P2 00:10:20
  • 3. Pre-Exploitation Lab P3 00:10:20
  • 5. Pre-Exploitation Lab P5 00:10:04
  • 4. Pre-Exploitation Lab P4 00:10:14
  • 6. Pre-Exploitation Lab P6 00:26:46
  • 7. Pre-Exploitation Lab P7 00:10:01
  • 1. Exploitation Lab P1 00:10:05
  • 2. Exploitation Lab P2 00:10:01
  • 3. Exploitation Lab P3 00:10:09
  • 1. Post-Exploitation Lab P1 00:09:48
  • 2. Post-Exploitation Lab P2 00:10:25
  • 1. Password Cracking Concepts and Methodologies P1 00:10:18
  • 2. Password Cracking Concepts and Methodologies P2 00:10:55
  • 3. Password Cracking Concepts and Methodologies P3 00:10:28
  • 4. Password Cracking Concepts and Methodologies P4 00:11:10
  • 5. Password Cracking Concepts and Methodologies P5 00:10:18
  • 6. Password Cracking Concepts and Methodologies P6 00:09:51
  • 1. Offline Password Cracking Lab P1 00:15:00
  • 2. Offline Password Cracking Lab P2 00:09:48
  • 1. Cryptography Fundamentals for Hackers P1 00:10:31
  • 2. Cryptography Fundamentals for Hackers P2 00:10:27
  • 3. Cryptography Fundamentals for Hackers P3 00:10:06
  • 4. Cryptography Fundamentals for Hackers P4 00:12:43
  • 1. Course Overview P1 00:10:08
  • 1. Course Overview P1 00:10:45
  • 2. Course Overview P2 00:08:07
  • 2. Course Overview P3 00:10:38
+ View more
Description
After completion of this course, the students will have a fundamental background in ethical hacking and would be able to pursue Certified Ethical Hacker (CEH) certification.