Skip to Content
    • 2. The Ethical Hacking Process
    • 2.1 The Ethical Hacking Process PPT
    • 3. The Advantages of Becoming an Ethical Hacker
    • Why Kali Linux
    • Booting Up Kali Linux
    • The Linux Filesystem
    • Managing Linux Services
    • Searching, Installing, and Removing Tools
    • 7. Kali Linux CLI - Environment Variables
    • 8. Kali Linux CLI - Bash History Command
    • Kali Linux CLI - Piping and Redirection
    • Kali Linux CLI - Text Searching and Manipulation
    • 11. Kali Linux CLI - Editing Files
    • 12. Kali Linux CLI - Comparing Files
    • 13. Kali Linux CLI - Managing Processes
    • 14. Kali Linux CLI - File and Command Monitoring
    • 15. Kali Linux CLI - Downloading Files
    • 16. Kali Linux CLI - Customizing the Bash Environment
    • 17. Netcat (nc) Essentials
    • 18. Bash Scripting - Our First Bash Script
    • 19. Bash Scripting - Variables
    • 20. Bash Scripting - If, Else, Elif Statements
    • 21. Bash Scripting - Loops
    • 22. Bash Scripting - Functions
    • How Web Applications Work
    • How Web Applications Work - PPT
    • HTTP (Hypertext Transfer Protocol)- PPT
    • What is DNS and How DNS works ?
    • OWASP Top 10 Vulnerabilities
    • Web Application Assessment Tools - DIRB
    • Web Application Assessment Tools - Burp Suite
    • Web Application Assessment Tools - Nikto
    • OWASP Top 10 Vulnerabilities PPT
    • 1. Networking Essentials
    • 1.1 Networking Essentials- PPT
    • 2. OSI model
    • 3. What is Wireshark and why should you learn it
    • 4. Install Wireshark
    • 5. WireShark Getting Started
    • 6. Sets a filter for any packet that has x.x.x.x as IP address
    • 7. Sets a conversation filter between two specific IP addresses
    • 8. Sets a filter to display all http and dns protocols
    • 9. Sets filters for any TCP packet with a specific source or destination port
    • 10. Displays all TCP packets that contain a certain term
    • 11. Filters all HTTP GET and POST requests
    • 12. Filter out certain types of protocols
    • 13. Can Wireshark capture passwords
    • 14. Plain text network protocols
    • 15. Capture Insecure Connections (Net Cat)
    • 16. Capture FTP Passwords
    • 17. Extract files from FTP using Wireshark
    • 18. Capture HTTP Passwords
    • 19. Capture files (images) from HTTP traffic
    • Detect service-daemon versions
    • Port Scanners Essentials
    • What is Nmap
    • Preparing the Environment
    • Scanning Techniques of Nmap
    • Basic Nmap Scan against IP or host
    • Nmap Ping Scan
    • Scan specific ports or scan entire port ranges
    • Scan multiple IP addresses
    • Scan hosts and IP addresses reading from a text file
    • Save your Nmap scan results to a file
    • Disabling DNS name resolution
    • Scan + OS and service detection with fast execution
    • Detect servicedaemon versions
    • Scan using TCP or UDP protocols
    • CVE detection using Nmap
    • Launching DOS with Nmap
    • Launching brute force attacks
    • Detecting malware infections on remote hosts
    • Nmap Firewall and IDS Evasion Techniques
    • 1. What is Python and why it is used in Security
    • 1.1 What is Python and why it is used in Security PPT
    • 2. Install Python
    • 3. Hello World
    • 4. Data Types
    • 5. Numbers
    • 6. Math functions
    • 7. Operator Precedence
    • 8. Variables
    • 9. Strings
    • 10. Strings Concatenate
    • 11. Types conversion
    • 12. Escape sequence
    • 13. Formatted strings
    • 14. Strings indexes
    • 15. Boolean
    • 16. Lists
    • 17. List Methods
    • 18. Matrix
    • 19. None
    • 20. Dictionary
    • 21. Dictionary Methods
    • 22. Tuple