Skip to content
+897 243 7849
Rock Street, San Francisco
Search for:
TOP MENU
Primary Menu
Services
Contact Us
Profile
Checkout
courses [Labs]
Research Articles
Get Quote
Search for:
Get Quote
+897 243 7849
Rock Street, San Francisco
Archives
June 2025
May 2025
April 2025
Categories
Application Vulnerabilities
Cyber security news
Tech News
Uncategorized
Home
Courses
[VIDEO] Complete cybersecurity course and [Penetration testing] (with Virtual Labs)
[VIDEO] Complete cybersecurity course and [Penetration testing] (with Virtual Labs)
Curriculum
10 Sections
43 Lessons
7 Weeks
Expand all sections
Collapse all sections
Learning the Kali Linux operating system: Beginners to advance
Students would be able to gain the fundamental knowledge on how to navigate the Kali Linux OS which is a popular choice among cyber security professionals and ethical hackers.
13
1.1
Introduction to course
1.2
Introduction to Remote access trojan (RAT) part 1
1.3
Kali Linux installation
1.4
Introduction to Kali Linux terminal (hands on practicals)
1.5
Understanding the “sudo” command
1.6
File management in Kali Linux (Part 2)
1.7
Creating users and groups using CLI in Kali Linux
1.8
Creating and managing groups
1.9
The Nano text editor
1.10
The SSH protocol (Secure shell)
1.11
Terminal commands (find any file)
1.12
File permissions on Kali linux
1.13
File Management in Kali Linux l (hands on practicals)
Understanding the Kali Linux operating system
2
2.1
Network commands
2.2
Viewing processes on the Kali Linux server
Virtualization - Setting up your hacking lab
2
3.1
Creating an Isolated network – DHCP servers and IP Assignment
3.2
Installation and setup of the BWAPP
How to hack a website : Exploitation and post exploitation
4
4.1
How to plant a backdoor on a website: Remote code execution
4.2
How to carry out LFI using Burp suite 1
4.3
How to carry out LFI using Burp suite 2
4.4
How to take over a website using: OS command injection
How to gather information about devices (information gathering)
6
5.1
How to gather information gathering using Nmap (network Mapper)
5.2
How to carry out DNS Enumeration
5.3
More on Nmap commands
5.4
Sub domain Enumeration
5.5
extract all emails and other information from a website – SFcrawler
5.6
Shodan.io search engine
How to hack a website 2 : exploitation and post exploitation
2
6.1
How to carry out SQLI (structure query language injection)
6.2
Exploiting the Cross site scripting (XSS) vulnerability
How to scan for vulnerabilities in websites
6
7.1
Web application vulnerability Assessment 1 – Nikto scanner
7.2
How to carry out directory brute-forcing: fishing out hidden file directories
7.3
Web application vulnerability Assessment 2 – OWASPZAP
7.4
Web application vulnerability Assessment 3 – Nmap scripting engine
7.5
Proxychains and Proxy server
7.6
Web application vulnerability Assessment 4 – Skipfish
Learning the Mestasploit framework MSF (Vulnerability Expolitation with MSF)
2
8.1
Learn Exploitation using Metasploit framework 1
8.2
Learn Exploitation with Metasploit framework 2
AI (Artificial intelligence) in reverse engineering
1
9.1
AI in malware reverse engineering
Malware analysis and phishing simulations
5
10.1
MALWARE SAMPLES [RAT, TROJANS, KEYLOGGERS] [zip files]
10.2
Installing the windows 10 VM (VIRTUALIZATION) Part 1
10.3
Understanding Remote access trojan (RAT) part 2
10.4
Understanding Remote access trojan (RAT) part 3
10.5
Understanding Remote access Trojan (RAT) part 4
This content is protected, please
login
and
enroll
in the course to view this content!
Modal title
Main Content