Overview
Syllabus
- Introduction/whoami
- A Day in the Life of an Ethical Hacker
- Effective Notekeeping
- Important Tools
- Networking Refresher: Introduction
- IP Addresses
- MAC Addresses
- TCP, UDP, & the Three-Way Handshake
- Common Ports & Protocols
- The OSI Model
- Subnetting, Part 1
- Subnetting, Part 2
- Installing VMWare / VirtualBox
- Installing Kali Linux
- Configuring VirtualBox
- Kali Linux Overview
- Sudo Overview
- Navigating the File System
- Users & Privileges
- Common Network Commands
- Viewing, Creating, & Editing Files
- Starting and Stopping Services
- Installing and Updating Tools
- Bash Scripting
- Intro to Python
- Strings
- Math
- Variables & Methods
- Functions
- Boolean Expressions and Relational Operators
- Conditional Statements
- Lists
- Tuples
- Looping
- Advanced Strings
- Dictionaries
- Importing Modules
- Sockets
- Building a Port Scanner
- User Input
- Reading and Writing Files
- Classes and Objects
- Building a Shoe Budget Tool
- The 5 Stages of Ethical Hacking
- Passive Recon Overview
- Identifying Our Target
- Discovering Email Addresses
- Breached Credentials Part 1
- Breached Credentials Part 2
- End Part 1
Taught by
The Cyber Mentor