Skip to content
+897 243 7849
Rock Street, San Francisco
Search for:
TOP MENU
Primary Menu
Services
Contact Us
Profile
Checkout
Research Articles
Courses [Virtual Labs]
Get Quote
Search for:
Get Quote
+897 243 7849
Rock Street, San Francisco
Archives
June 2025
May 2025
April 2025
Categories
Application Vulnerabilities
Cyber security news
Tech News
Uncategorized
Home
Courses
Complete cybersecurity course and [Penetration testing and Ethical hacking] (with Virtual Labs)
Complete cybersecurity course and [Penetration testing and Ethical hacking] (with Virtual Labs)
Curriculum
10 Sections
50 Lessons
7 Weeks
Expand all sections
Collapse all sections
Learning the Kali Linux operating system: Beginners to advance
Students would be able to gain the fundamental knowledge on how to navigate the Kali Linux OS which is a popular choice among cyber security professionals and ethical hackers.
15
1.1
Introduction to course [ADVERT]
1.2
Introduction to Remote access trojan (RAT) part 1 [INTRO]
1.3
Kali Linux installation [START COURSE]
1.4
Introduction to Kali Linux terminal (hands on practicals)
1.5
📝 Kali Linux Terminal Practice Worksheet
1.6
Understanding the “sudo” command
1.7
📝 Kali Linux Terminal Practice Worksheet (Extended)
1.8
File management in Kali Linux (Part 2)
1.9
Creating users and groups using CLI in Kali Linux
1.10
Creating and managing groups
1.11
File permissions on Kali linux
1.12
The Nano text editor
1.13
The SSH protocol (Secure shell)
1.14
Terminal commands (find any file)
1.15
File Management in Kali Linux l (hands on practicals)
Understanding the Kali Linux operating system
2
2.1
Network commands
2.2
Viewing processes on the Kali Linux server
Virtualization
3
3.1
Installation and setup of the BWAPP
3.2
Creating an isolated network for testing purposes
3.3
Creating an Isolated network – DHCP servers and IP Assignment
How to hack a website : Exploitation and post exploitation
7
4.1
How to plant a backdoor on a website: PHP Remote code execution
4.2
Introduction to Burp suite
4.3
Burp suite configuration and setup [Virtual Lab]
4.4
Introduction to Wordlists, wordlists injection and attack
4.5
How to carry out LFI using Burp suite 1
4.6
How to carry out LFI using Burp suite 2
4.7
How to take over a website using: OS command injection
How to gather information about devices (information gathering)
7
5.1
N-map [Network mapper] Introduction
5.2
How to gather information gathering using Nmap (network Mapper)
5.3
How to carry out DNS Enumeration
5.4
More on Nmap commands
5.5
Sub domain Enumeration
5.6
Extract all emails and other information from a website – SFcrawler
5.7
Shodan.io
How to hack a website 2 : exploitation and post exploitation
2
6.1
How to carry out SQLI (structure query language injection)
6.2
Exploiting the Cross site scripting (XSS) vulnerability
web application security and attack
6
7.1
Web application vulnerability Assessment 1 – Nikto scanner
7.2
How to carry out directory brute-forcing: fishing out hidden file directories
7.3
Web application vulnerability Assessment 2 – OWASPZAP
7.4
Web application vulnerability Assessment 3 – Nmap scripting engine
7.5
Proxychains and Proxy server
7.6
Web application vulnerability Assessment 4 – Skipfish
Learning the Mestasploit framework MSF (Vulnerability Expolitation with MSF)
2
8.1
Learn Exploitation using Metasploit framework 1
8.2
Learn Exploitation with Metasploit framework 2
AI (Artificial intelligence) in reverse engineering
1
9.1
AI in malware reverse engineering
Malware analysis and phishing simulations
5
10.1
MALWARE SAMPLES [RAT, TROJANS, KEYLOGGERS] [ORIGINAL SOURCE FILE .ZIP]
10.2
Installing the windows 10 VM (VIRTUALIZATION) Part 1
10.3
Understanding Remote access trojan (RAT) part 2
10.4
Understanding Remote access trojan (RAT) part 3 [EXPLOITAION]
10.5
Understanding Remote access Trojan (RAT) part 4 [ENCRYPTION]
This content is protected, please
login
and
enroll
in the course to view this content!
Modal title
Main Content