Ethical Hacking in 15 Hours 2023 Edition Learn to Hack ( Part 1)
0:00 Introduction, whoami 6:43 A Day in the Life of an Ethical Hacker 27:44 Effective Notekeeping 34:27 Important Tools 39:51 Networking Refresher: Introduction 41:06 IP Addresses 54:18 MAC Addresses 57:35 TCP, UDP, the ThreeWay Handshake 1:02:51 Common Ports Protocols 1:09:04 The OSI Model 1:14:39 Subnetting, Part 1 1:41:42 Subnetting, Part 2 1:46:01 Installing VMWare, VirtualBox 1:52:19 Installing Kali Linux 1:57:55 Configuring VirtualBox 2:01:17 Kali Linux Overview 2:04:48 Sudo Overview 2:10:05 Navigating the File System 2:28:22 Users Privileges 2:45:21 Common Network Commands 2:53:51 Viewing, Creating, Editing Files 3:00:16 Starting and Stopping Services 3:06:38 Installing and Updating Tools 3:18:35 Bash Scripting 3:41:14 Intro to Python 3:43:37 Strings 3:51:00 Math 3:56:45 Variables Methods 4:07:05 Functions 4:16:03 Boolean Expre
|
|