Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Ethical Hacking: Video Companion

    Posted By: ELK1nG
    Ethical Hacking: Video Companion

    Ethical Hacking: Video Companion
    Published 7/2025
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.43 GB | Duration: 7h 21m

    Video companion course for the Ethical Hacking book by Daniel Graham

    What you'll learn

    Understand fundamental ethical hacking concepts, methodologies, and the hacker mindset, aligning theory with practical techniques demonstrated in the videos.

    Master the setup, configuration, and effective use of essential ethical hacking tools discussed in the textbook through guided video tutorials.

    Apply penetration testing skills to realistic scenarios by following hands-on demonstrations that enhance the examples and labs from the textbook.

    Develop skills in identifying, exploiting, and mitigating common security vulnerabilities by combining video instruction with structured reading

    Requirements

    Some programming experience in python

    Description

    This course is a video-based companion to the bestselling book Ethical Hacking: A Hands-On Introduction to Breaking In. It is specifically designed to follow the structure and flow of the book, providing students with guided walkthroughs, live demonstrations, and extended insights into the tools, concepts, and techniques discussed throughout the text. Each video module aligns with a chapter in the book, allowing learners to reinforce and deepen their understanding through visual explanations and practical, step-by-step examples.Students are required to purchase the book, as it serves as the foundational reference for all lectures, lab activities, and assignments. The book contains critical details, code samples, and exercises that are not fully reproduced in the videos. Rather than replacing the book, this course is intended to enhance the learning experience, making complex material more approachable and actionable. You can purchase the book: Ethical Hacking: A Hands-on Introduction to Breaking In by Daniel GrahamWhether you are a student, aspiring ethical hacker, or cybersecurity enthusiast, this course will help you build confidence and practical skills by engaging with real-world hacking tools in a legal and controlled environment. By combining the strengths of video instruction and written material, this course provides a complete and immersive learning journey into the world of ethical hacking.

    Overview

    Section 1: Introduction

    Lecture 1 Introduction

    Section 2: Fundamentals

    Lecture 2 Chapter - 1 - Setting Up Your environment

    Lecture 3 Chapter - 2- ARP Spoofing

    Lecture 4 Chapter - 3- Part-1- Portocols and Ports

    Lecture 5 Chapter -3- Part 2- Wireshark Analysis

    Lecture 6 Chapter -4- Part 1 - TCP and Sockets

    Lecture 7 Chapter -4- Part -2 Botnets and Shells

    Section 3: Encryption

    Lecture 8 Chapter 5 - Part -1 - Block -Ciphers

    Lecture 9 Chapter 5 - Part -2 - Ransomeware

    Lecture 10 Chapter 5 - Part -3- PGP

    Lecture 11 Chapter 6 - Part - 1 - TLS

    Lecture 12 Chapter 6 - Part -2 -Diffie–Hellman key exchange

    Section 4: Social Engineering

    Lecture 13 Chapter 7 - Part 1 - Fake Emails

    Lecture 14 Chapter 7 - Part 2 - Fake Sites

    Lecture 15 Chapter 8 Part 1 Link Analysis

    Lecture 16 Chapter 8 Part 2 Scanning and Exploitation

    Section 5: Exploitation

    Lecture 17 Chapter 9 Part -1- Heartbleed Case Study

    Lecture 18 Chapter 9 Part - 2- Fuzzing

    Lecture 19 Chapter 9 Part 3 Dynamic Symbolic Execution

    Lecture 20 Chapter 10 - Part 1- Trojans

    Lecture 21 Chapter 10 Part 2 - Encoding

    Lecture 22 Chapter 11 - Part 1 - Kernel Modules and Rootkits

    Lecture 23 Chapter 11 Part 2 - System Calls

    Section 6: Attacking Web Apps

    Lecture 24 Chapter 12 - Part 1 - Understand SQL Injection

    Lecture 25 Chapter 12 - Part 2 - SQL Inject Attack Demo

    Lecture 26 Chapter 12 - Part 3 - Understanding MD5 Hashes

    Lecture 27 Chapter 13 - Part 1- XSS Beef

    Lecture 28 Chapter 13 - Part 2 - From the browser to the OS

    Beginners in cyber security.