Ethical Hacking: Video Companion

Posted By: ELK1nG

Ethical Hacking: Video Companion
Published 7/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.43 GB | Duration: 7h 21m

Video companion course for the Ethical Hacking book by Daniel Graham

What you'll learn

Understand fundamental ethical hacking concepts, methodologies, and the hacker mindset, aligning theory with practical techniques demonstrated in the videos.

Master the setup, configuration, and effective use of essential ethical hacking tools discussed in the textbook through guided video tutorials.

Apply penetration testing skills to realistic scenarios by following hands-on demonstrations that enhance the examples and labs from the textbook.

Develop skills in identifying, exploiting, and mitigating common security vulnerabilities by combining video instruction with structured reading

Requirements

Some programming experience in python

Description

This course is a video-based companion to the bestselling book Ethical Hacking: A Hands-On Introduction to Breaking In. It is specifically designed to follow the structure and flow of the book, providing students with guided walkthroughs, live demonstrations, and extended insights into the tools, concepts, and techniques discussed throughout the text. Each video module aligns with a chapter in the book, allowing learners to reinforce and deepen their understanding through visual explanations and practical, step-by-step examples.Students are required to purchase the book, as it serves as the foundational reference for all lectures, lab activities, and assignments. The book contains critical details, code samples, and exercises that are not fully reproduced in the videos. Rather than replacing the book, this course is intended to enhance the learning experience, making complex material more approachable and actionable. You can purchase the book: Ethical Hacking: A Hands-on Introduction to Breaking In by Daniel GrahamWhether you are a student, aspiring ethical hacker, or cybersecurity enthusiast, this course will help you build confidence and practical skills by engaging with real-world hacking tools in a legal and controlled environment. By combining the strengths of video instruction and written material, this course provides a complete and immersive learning journey into the world of ethical hacking.

Overview

Section 1: Introduction

Lecture 1 Introduction

Section 2: Fundamentals

Lecture 2 Chapter - 1 - Setting Up Your environment

Lecture 3 Chapter - 2- ARP Spoofing

Lecture 4 Chapter - 3- Part-1- Portocols and Ports

Lecture 5 Chapter -3- Part 2- Wireshark Analysis

Lecture 6 Chapter -4- Part 1 - TCP and Sockets

Lecture 7 Chapter -4- Part -2 Botnets and Shells

Section 3: Encryption

Lecture 8 Chapter 5 - Part -1 - Block -Ciphers

Lecture 9 Chapter 5 - Part -2 - Ransomeware

Lecture 10 Chapter 5 - Part -3- PGP

Lecture 11 Chapter 6 - Part - 1 - TLS

Lecture 12 Chapter 6 - Part -2 -Diffie–Hellman key exchange

Section 4: Social Engineering

Lecture 13 Chapter 7 - Part 1 - Fake Emails

Lecture 14 Chapter 7 - Part 2 - Fake Sites

Lecture 15 Chapter 8 Part 1 Link Analysis

Lecture 16 Chapter 8 Part 2 Scanning and Exploitation

Section 5: Exploitation

Lecture 17 Chapter 9 Part -1- Heartbleed Case Study

Lecture 18 Chapter 9 Part - 2- Fuzzing

Lecture 19 Chapter 9 Part 3 Dynamic Symbolic Execution

Lecture 20 Chapter 10 - Part 1- Trojans

Lecture 21 Chapter 10 Part 2 - Encoding

Lecture 22 Chapter 11 - Part 1 - Kernel Modules and Rootkits

Lecture 23 Chapter 11 Part 2 - System Calls

Section 6: Attacking Web Apps

Lecture 24 Chapter 12 - Part 1 - Understand SQL Injection

Lecture 25 Chapter 12 - Part 2 - SQL Inject Attack Demo

Lecture 26 Chapter 12 - Part 3 - Understanding MD5 Hashes

Lecture 27 Chapter 13 - Part 1- XSS Beef

Lecture 28 Chapter 13 - Part 2 - From the browser to the OS

Beginners in cyber security.