- Introduction and setup
- Port and vulnerability scanning
- SSH and FTP attacks
- Password cracking
- Sniffers, flooders, and spoofers
- DNS spoofing
- Network analysis
- Coding a multi-functioning reverse shell
- Keyloggers
- Command and control center
- Website penetration testing
This course was designed for students interested in intermediate to advanced level ethical hacking tutorials, however, it is still taught in a step-by-step, beginner-friendly method. English subtitles are available and all lectures are downloadable for offline viewing. 1 on 1 assistance with the coding projects is available within the discussion forum.
No comments:
Post a Comment