Real Ethical Hacking in 43 Hours Certificated CSEH+CEH 2024
Learn valuable, practical skills from free online video courses. Explore tech essentials and keep pace with change. Become more focused and productive. Top it off with courses that round out your skills and enrich your day to day.
1. Introduction and First Steps
2. Operating System
Mastering Boot Starting Firmware Interfaces
File Allocation Tables
3. Creating our ethical hacking lab
Getting Started
Installing Virtual Machines
Installing Kali
Installing Metasploitable
4. Introduction to Networking
What is network protocol and what it does
Layers of TCPIP Model
How emails sent and received over internet
PDU Explained
Basic Use of Switch and Data Transmission
2 Networks Talking with Router in Middle
5. Bypassing Network Access Control
Introduction to Section and Fundamentals of Media Control Filtering
Linux WAP and Bypassing Mac Filtering
6. Cybersecurity - Beginning
Introduction to Passive Information Gathering
What is Cybercrime
Three Types of Cybercrime
Examples to Cybercrime
What is Cyber Security
Firewalls
Windows Firewall
DMZ
VPN
7. Vulnerability Assassment
Introduction to Section
Why is VulnScanning is BAD
8. OSINT
Introduction to Passive Information Gathering
Differences Between Recon and Footprinting
Understanding Passive Information Gathering and OSINT
Introduction to OSINT
Principles of Recon
Offensive OSINT
Using SBLSTR for Finding Subdomains
USUFY as Osint Tool
Finding Deleted WebPages
THRVSTR as Osint Tool
Reverse Image Search
GHDB
GHDB Part 2
9. Storage Media - Module 1
The History of Storage Media
Magnetic Tape Drives
Floppy Disks
Optical Storage Media
DVD
Blu-ray
10. Storage Media - Module 2
Flash Storage Media
USB Flash Drives
Flash Memory Card
11. Storage Media - Module 3
Hard Disk Drives (HDD)
Solid State Drives (SSD)
12. Starting with Basic Linux Commands - CSEH
Understanding Linux Commands and Pipes
What is a Command
Pipeline example
Weird LS Command
Different Linux Commands using with Pipe
13. Starting with Linux Terminal - CSEH
Understanding key concepts
Finding Helpful manuals
Linux Directories
Linux Directories - Part 2
14. Starting with Linux Shell - CSEH
The bridge between You and Shell
Exploring the Linux System - CSEH
LS Command
RD vs APD
Filtering LS
CP Command
Tab Auto-completion
SYM AND HRD Link Files
Manipulating Files
16. Starting with Linux Shell - CSEH
Introduction to Shell and Expansion
Arithmetic Expressions with Shell
Automating Folder Creation with Shell
Quoting in Shell
17. Permissions - CSEH
Introduction to Permissions in Linux
Differences between UID, GID and Shadow
File and Dir Permissions
Examples with File Permissions
After this video you'll understand all LINUX Permissions
Chmod
18. Processes in Linux - CSEH
Fundamentals of Processes in System
The Magic with PS Aux Command
The Magic with TOP Command
Foreground and Background Processes
From Background to Foreground
The Tutorial with Linux Process Signals
19. Packet Management Systems in Linux - CSEH
Introduction to Packet Management Systems
Why we need package management tools
Package Management in Linux - Final
20. Network Security Cyber Security
The main goal and importance of Network Security
3 Main Ways to Make your Network Stronger
A Chain is no stronger than its weakest link
What is Network Maps in Cyber Security
21. Network Security Concepts
Main Guidelines for Network Security
Analysis to Consider and Action Priority
Threat Modeling
22. Getting Started with Networking - CSEH
Trcrt command
Networking with Linux
23. Linux - File System
Linux - Filesystem Part 1
Linux - Filesystem Part 2
Linux - Logging and Remaining Stealthy
Linux Creating our own Web Server
24. Linux - Working with Archive files
Linux - Working With Archive Files 1
Linux - Working With Archive Files 2
25. Linux - Working With Files and Permissions
Linux Working With Files - Part 1
Linux Working With Files - Part 2
26. Linux - Working with Processes
Working with Processes - Part 1
Linux Filtering Processes
Working With Processes - Part 2
Working with Processes - Part 3
27. Linux - Working With USER Environment Variables
User Environment Variable Introduction
Changing Environment Variables
Editing and Creating New Variables
28. Linux - Networking
Fundamentals of Linux Introduction
Dealing With Files
Linux Network Manipulation - Part 1
Linux Mac Address Spoofing
Changing DNS in Linux
Manipulating Hosts File
29. Linux - Software Control
Linux APT Part 1
Linux APT Part 2
30. Networking
TCP-IP - Part 1
TCP-IP - Part 2
TCP-IP - Part 3
TCP-IP - Part 4
TCP-IP - Part 5
31. Wireshark Ninja - Fundamentals
What is Wireshark and What you'll learn in this section
Introduction to Interface and Important Shortcuts
The Importance of Promiscuous Mode
Displaying the Captured Data and Plugins
32. Networking - Capturing Network Traffic
Passive Capture and Wireshark
Active and Passive Capture
33. Starting with Wireshark
1. Unlocking the Secrets of Network Traffic Unleash the Power of Wireshark!
2. Power Trio Exploring IDS, ACLs, and Firewalls for Network Security
3. Wireshark's Capture Power Dive into Live Traffic Analysis with Live Filters
Decoding Signal Types Unveiling the Language of Communication
34. Advanced Networking Topics for Wireshark
1. Beginning to use Wireshark Display Filters
2. Learning TCP States
35. Android Hacking - Mobile Hacking - IOS Hacking
The Anatomy of Android System Architecture
36. Information Gathering
Introduction to Information Gathering
DNS Info Gathering
Maltego - Part 1
Reconnaissance and Foot printing
37. Starting Practical with Nmap
Nmap's Network Scanning Capabilities
Beginning to Using NSE Scripts
Port scanning on Servers
Port scanning techniques and Interface Selection
Targeting and Excluding Networks with CIDR
Nmap Operating System Detection
Random Port Scanning and Legal Issues
38. Being Real Nmap Pro
Unique Techniques that you'll learn in this section
Advanced TCP ACK and SYN Scan
Advanced ICMP
39. Reconnaissance with Nmap
Introduction to Reconnaissance
IP Geolocation and WhoIS using Nmap
Graphical Traceroute
40. Scanning Web Servers with Nmap
Explanation and What Skills you'll earn in this section
Scanning HTTP Methods and Potential Risks
Searching for Digital Gold in the Web Server Maze
41. Detecting Firewalls
Web Application Firewall and IPS Detection
42. The Importance of Programming and Thinking in Hacking
Why C++ Is Important for Ethical Hacking
A1 - CPP Newlines, Tabs and Spaces
A1 - Initializers in CPP
A2 - CPP Writing Styles
A3 - Statements and Expressions, RVALUE and LVALUE
A4 - Comma
A5 - Types and Variables
A6 - Literals in CPP
A7 - Defining Constants
A8 - Const Expressions
Beginning to Pointers
A11 - Namespaces in CPP
A12 - Scoping Variables and Static Keyword
Conditional Statements
43. Types and Conditional Statements in C++
A1 - Types in CPP - Binary, Octal and Hex
A2 - Floating Point types in CPP - Float, Double, Long Double
A3 - Char types in CPP
A4 - Enum Types
A4 - Boolean Types and Comparison Operators
A5 - Void Type and Void Function
A6 - 1 Operators 101
A7 - Default Values in CPP
A1 - Switch Statement with ENUM
A2 - Conditional Statements in CPP
A3 - For Loop
A4 - Continue Keyword
A5 - Do-While Loop
A6 - Goto
44. Classes and Pointers in C++
A1 - POD Data Classes
A2 - Unions in CPP
A3 - Methods in Struct
A4 - Access Controls in CPP
A5 - Classes and Initializing Class Member
A6 - Constructors
A7 - Destructors in CPP
A8 - Initializers in CPP
11 - Pointers in CPP
A1 - C++ Beginning to Pointers
A2 - Dereference Operator in CPP
A3 - Pointers and Arrays
B2 - nullptr
B3 - Pointer arithmetic in CPP
C1 - Arrays out of bounds and Deallocating Pointers
C2 - Consts and Casts with Pointers
C3 - Allocating Memory
C4 - Allocating memory as arrays
C5 - Lifetime of Memory
45. STL, References, Pointers in C++
A1 - STL, Vectors and Arrays
A1 - References
A2 - Example Project With References
A3 - Code Example with AUTO, TUPLE and FOR LOOP
A4 - Range Based for Loop
A1 - Pointers in Practice
A2 - Pointers in Practice - Part 2
A3 - Pointers in Practice - Part 3
A4- Pointers in Practice - Part 4
46. Functions in C++
A1 - Introduction to Functions
A2 - Functions - Part 1
A3 - Functions - Part 2
A4 - Functions - Part 3
A5 - Functions - Part 4
A6 - Functions - Part 5
A7 - Functions - Part 6
A8 - Functions - Part 7
47. Data Structures in C++
A1 - Introduction to Basic CPP Programming
A2 - Creating Random Card Generator Using Enum and rand
A3 - Developing main Function and using static_cast
A1 - Introduction to ADT
A2 - Creating ADT Class and using Constructors
A3 - Virtual Methods and Overriding from Class
A4 - Controlling Copy Operations with ADT
A1 - Starting with Templates
A2 - Class Templates in CPP
A1 - Introduction to STL
A2 - Algorithm Analysis
A3 - Scenario Analysis
A4 - Developing Main
A5 - Factorial Method
A1 - Understanding Arrays
A2 - Manipulating Arrays
A3 - Starting with Array Pointers
A4 - Pointer Increment vs Array Indexing
A1 - Creating List ADT
A2 - Developing Get and Insert Methods
A3 - Developing Search and Remove Methods
A4 - Testing ADT List
A1 - Node and Chaining Example
A2 - Creating and Chaining nodes with Different data types
A1 - Creating Custom Linked List
A2 - Get Method
A3 - Developing InsertHead, InsertTail and Insert Methods
A4 - Developing Search Operation
A4 - Removing Items
48. SQL Training for Ethical Hacking - Introduction
Preparing Environment in 16 Mins
A2 - Starting with PostgreSQL
A3 - Customizing pgAdmin
A4 - Creating our First database and Adding Tables
A5 - Creating our First database and Adding Tables Part 2
49. SQL for Ethical Hacking Creating our first Database and Table
A1 - Adding Data into Tables
A2 - Starting with Select Keyword
A3 - Order by
A4 - Magic with WHERE and Operators
A5 - Learning Logical Operation in SQL
50. SQL for Ethical Hacking Datatypes in SQL
1. A1 - Basic Datatypes in SQL
2. A2 - Char and Text Types in Practice and Exporting TXT Files
3. A3 - Integers in SQL
4. A4 - Other ways to use INCREMENT
5. A5 - Floating Point Numbers and Their Disadvantages
51. Ethical Hacking for SQL Dates and Times in SQL
1. A1 - UTC, Dates and Times in SQL
2. A2 - Timestamp with Timezone Interval
52. Learning Python for Ethical Hacking - Variables and Strings in Python
1. First Steps in Python
2. Defining Variable Names
3. Misspelling and Finding Errors in Variable Names
4. String Manipulation
5. Format String in Python
6. String Manipulation Functions
7. String Manipulation Functions - Part 2
53. Learning Python for Ethical Hacking - Numbers in Python
1. Integers and Floats in Python
2. Floats and Constants in Python
3. Comments in Kotlin
Comments