Topic 1
Introduction to ethical hacking
Java Version Management and Compatibility
Understanding Java versions and their compatibility
Navigating Directories with CD
Using the cd command to change directories in the terminal
Understanding MAC Addresses
Definition and function of MAC addresses
Changing MAC addresses via shell scripting
Remaining anonymous through proxy and VPN configuration
Installing Virtual Machines for Testing
Setting up and configuring virtual machines for testing purposes
Types of Footprinting and Reconnaissance
Introduction to footprinting and reconnaissance
Footprinting techniques for website analysis
Identifying website technologies using Netcraft and Wapplyzer
Using ProxyGhost for Easy Proxy Configuration
Setting up and using ProxyGhost for easy proxy configuration
HTTP Methods and Their Functions
Understanding different HTTP methods and their functions
Capturing and Modifying Data Packets with Wireshark
Using Wireshark to capture and analyze data packets
Modifying data packets with Wireshark
Linux Source List Update and Upgrade
Updating and upgrading the Linux source list
IPv4 vs. IPv6: Differences and Features
Comparison of IPv4 and IPv6
Understanding the differences and features of IPv4 and IPv6
Networking Protocols: Types and Functions
Introduction to networking protocols
Understanding the types and functions of networking protocols
Analyzing Security Headers for Vulnerabilities
Analyzing security headers for potential vulnerabilities
Public and Private IP Addresses
Definition and function of public and private IP addresses
Understanding the difference between public and private IP addresses
Finding Subdomains using Subdomainfinder and Sublist3r
Finding subdomains using Subdomainfinder and Sublist3r
TTL and Packet Fragmentation
Understanding TTL and packet fragmentation
Buffer Size and Server Capacity
Understanding buffer size and server capacity
Testing server limits and security
Penetration Testing and Cyber Security
Introduction to penetration testing and cyber security
Determining IP and buffer size of a domain
SSL certificate security and vulnerability
Server Limitations and Buffer Overflow
Understanding server limitations and buffer overflow
DDoS attack and its implications
Ping Command and Packet Size
Using the ping command and adjusting packet size
Kali Linux Installation and Configuration
Installing and configuring Kali Linux
Discover Tool Installation and Usage
Installing and using the Discover tool
BurpSuite Installation and Cracking
Installing and configuring BurpSuite
Using BurpSuite for ethical hacking
Introduction to Information Gathering
Introduction to information gathering
Extracting hidden links using Link Extractor and DIRB
Understanding User Permissions
Understanding user permissions in Linux
Types of Networks in Networking
Introduction to types of networks
Understanding LAN, MAN and WAN
Computer Networking Fundamentals
Introduction to computer networking fundamentals
File Permissions and Chmod Command
Understanding file permissions and the chmod command
Managing Files and Folders
Managing files and folders in Linux
Installing Software with APT-GET
Installing and updating software with apt-get
Cybersecurity and Cyber Laws
Understanding cybersecurity and cyber laws
Configuring Crontab for Automatic MAC Changes
Configuring Crontab for automatic MAC address changes
Changing WiFi MAC Addresses
Changing WiFi MAC addresses
Understanding Footprinting and Reconnaissance
Understanding the process of footprinting and reconnaissance