Ethical Hacking - Learn to Hack

Ethical Hacking - Learn to Hack

The Cyber Mentor via YouTube Direct link

- Introduction/whoami

1 of 78

1 of 78

- Introduction/whoami

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Ethical Hacking - Learn to Hack

Automatically move to the next video in the Classroom when playback concludes

  1. 1 - Introduction/whoami
  2. 2 - A Day in the Life of an Ethical Hacker
  3. 3 - Effective Notekeeping
  4. 4 - Important Tools
  5. 5 - Networking Refresher: Introduction
  6. 6 - IP Addresses
  7. 7 - MAC Addresses
  8. 8 - TCP, UDP, & the Three-Way Handshake
  9. 9 - Common Ports & Protocols
  10. 10 - The OSI Model
  11. 11 - Subnetting
  12. 12 - Installing VMWare / VirtualBox
  13. 13 - Installing Kali Linux
  14. 14 - Configuring VirtualBox
  15. 15 - Kali Linux Overview
  16. 16 - Sudo Overview
  17. 17 - Navigating the File System
  18. 18 - Users & Privileges
  19. 19 - Common Network Commands
  20. 20 - Network Commands Update
  21. 21 - Installing & Updating Tools
  22. 22 - Installing gedit
  23. 23 - Viewing, Creating, & Editing Files
  24. 24 - Scripting with Bash
  25. 25 - Intro to Python
  26. 26 - Strings
  27. 27 - Math
  28. 28 - Variables & Methods
  29. 29 - Functions
  30. 30 - Boolean Expressions
  31. 31 - Relational & Boolean Operators
  32. 32 - Conditional Statements
  33. 33 - Lists
  34. 34 - Tuples
  35. 35 - Looping
  36. 36 - Importing Modules
  37. 37 - Advanced Strings
  38. 38 - Dictionaries
  39. 39 - Sockets
  40. 40 - Building a Port Scanner
  41. 41 - The 5 Stages of Ethical Hacking
  42. 42 - Passive Recon Overview
  43. 43 - Identifying Our Target
  44. 44 - Discovering Email Addresses
  45. 45 - Breached Credentials Part 1
  46. 46 - Breached Credentials Part 2
  47. 47 - Hunting Subdomains Part 1
  48. 48 - Hunting Subdomains Part 2
  49. 49 - Identifying Website Technologies
  50. 50 - Gathering Information w/ Burp Suite
  51. 51 - Google Fu
  52. 52 - Utilizing Social Media
  53. 53 - Installing Kioptrix
  54. 54 - Scanning w/ Nmap
  55. 55 - Enumerating HTTP/HTTPS Part 1
  56. 56 - Enumerating HTTP/HTTPS Part 2
  57. 57 - Enumerating SMB
  58. 58 - Enumerating SSH
  59. 59 - Researching Potential Vulnerabilities
  60. 60 - Our Notes So Far
  61. 61 - Scanning w/ Nessus Part 1
  62. 62 - Scanning w/ Nessus Part 2
  63. 63 - Reverse Shells vs Bind Shells
  64. 64 - Staged vs Non-Staged Payloads
  65. 65 - Gaining Root w/ Metasploit
  66. 66 - Manual Exploitation
  67. 67 - Brute Force Attacks
  68. 68 - Credential Stuffing & Password Spraying
  69. 69 - Our Notes, Revisited
  70. 70 - Capstone Introduction
  71. 71 - Setting up Blue
  72. 72 - Blue Walkthrough
  73. 73 - Academy Setup
  74. 74 - Academy Walkthrough
  75. 75 - Dev Walkthrough
  76. 76 - Butler Walkthrough
  77. 77 - Blackpearl Walkthrough
  78. 78 - Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.