@TCMSecurityAcademy

Hi everyone! I hope you enjoyed this video.  Please do consider subscribing so we can continue making awesome hacking content!  Below is all of the course info:

Full Course: https://academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course
All Course Resources/Links: https://github.com/Gr1mmie/Practical-Ethical-Hacking-Resources

A shout out to all those involved with helping out on this course:

Alek - Creating "Academy", "Dev", and "Black Pearl" Capstone machines and a Discord Admin.
Dewalt - The one man Army of a five star support team.
Dwight - Discord Admin and awesome hacker.
Grimmie - Creation of SumRecon, lover of cookies, and a Discord Admin.
Joe Helle - Creating the "Blue" Capstone machine and the PNPT foothold. The OG support staff and a Discord Admin.
Lian - The OG Discord Admin with French Bulldogs I'd like to steal.
Rumham - Discord Admin, lover of rum and hams, and overall great guy.

0:00 - Introduction/whoami
6:20 - A Day in the Life of an Ethical Hacker
23:14 - Effective Notekeeping
29:58 - Important Tools
35:23 - Networking Refresher: Introduction
36:39 - IP Addresses
49:50 - MAC Addresses
53:07 - TCP, UDP, & the Three-Way Handshake
58:25 - Common Ports & Protocols
1:04:39 - The OSI Model
1:10:14 - Subnetting
1:37:17 - Installing VMWare / VirtualBox
1:43:37 - Installing Kali Linux
1:50:11 - Configuring VirtualBox
1:53:32 - Kali Linux Overview
1:57:05 - Sudo Overview
2:02:22 - Navigating the File System
2:14:26 - Users & Privileges
2:23:54 - Common Network Commands
2:29:50 - Network Commands Update
2:31:49 - Installing & Updating Tools
2:41:01 - Installing gedit
2:42:46 - Viewing, Creating, & Editing Files
2:48:49 - Scripting with Bash
3:11:28 - Intro to Python
3:13:52 - Strings
3:21:25 - Math
3:27:24 - Variables & Methods
3:38:41 - Functions
3:49:40 - Boolean Expressions
3:54:14 - Relational & Boolean Operators
4:01:13 - Conditional Statements
4:10:13 - Lists
4:20:41 - Tuples
4:23:16 - Looping
4:28:18 - Importing Modules
4:34:24 - Advanced Strings
4:47:47 - Dictionaries
4:55:23 - Sockets
5:00:55 - Building a Port Scanner
5:21:09 - The 5 Stages of Ethical Hacking
5:26:31 - Passive Recon Overview
5:34:07 - Identifying Our Target
5:37:46 - Discovering Email Addresses
5:53:38 - Breached Credentials Part 1
6:01:00 - Breached Credentials Part 2
6:13:00 - Hunting Subdomains Part 1
6:18:35 - Hunting Subdomains Part 2
6:23:30 - Identifying Website Technologies
6:30:39 - Gathering Information w/ Burp Suite
6:39:33 - Google Fu
6:45:09 - Utilizing Social Media
6:50:49 - Installing Kioptrix
6:57:12 - Scanning w/ Nmap
7:17:04 - Enumerating HTTP/HTTPS Part 1
7:32:09 - Enumerating HTTP/HTTPS Part 2
7:47:22 - Enumerating SMB
8:01:46 - Enumerating SSH
8:05:59 - Researching Potential Vulnerabilities
8:20:54 - Our Notes So Far
8:24:03 - Scanning w/ Nessus Part 1
8:34:42 - Scanning w/ Nessus Part 2
8:40:57 - Reverse Shells vs Bind Shells
8:48:02 - Staged vs Non-Staged Payloads
8:51:27 - Gaining Root w/ Metasploit
8:59:13 - Manual Exploitation
9:11:57 - Brute Force Attacks
9:19:50 - Credential Stuffing & Password Spraying
9:33:58 - Our Notes, Revisited
9:37:05 - Capstone Introduction
9:42:54 - Setting up Blue
9:46:55 - Blue Walkthrough
10:04:00 - Academy Setup
10:06:28 - Academy Walkthrough
10:50:52 - Dev Walkthrough
11:16:18 - Butler Walkthrough
11:52:41 - Blackpearl Walkthrough
12:16:17 - Conclusion

@zeynepsenatnaz6444

I'm only 1.5 hours into the course and this was hands down the best explanation I've seen on internet  on subnetting so far. Amazing material

@newcastle911ify

I must say as a Network Engineer myself, that subnet sheet is very useful!

@Knitrokr

0:00 - Introduction/whoami
6:20 - A Day in the Life of an Ethical Hacker
23:14 - Effective Notekeeping
29:58 - Important Tools
35:23 - Networking Refresher: Introduction
36:39 - IP Addresses
49:50 - MAC Addresses
53:07 - TCP, UDP, & the Three-Way Handshake
58:25 - Common Ports & Protocols
1:04:39 - The OSI Model
1:10:14 - Subnetting
1:37:17 - Installing VMWare / VirtualBox
1:43:37 - Installing Kali Linux
1:50:11 - Configuring VirtualBox
1:53:32 - Kali Linux Overview
1:57:05 - Sudo Overview
2:02:22 - Navigating the File System
2:14:26 - Users & Privileges
2:23:54 - Common Network Commands
2:29:50 - Network Commands Update
2:31:49 - Installing & Updating Tools
2:41:01 - Installing gedit
2:42:46 - Viewing, Creating, & Editing Files
2:48:49 - Scripting with Bash
3:11:28 - Intro to Python
3:13:52 - Strings
3:21:25 - Math
3:27:24 - Variables & Methods
3:38:41 - Functions
3:49:40 - Boolean Expressions
3:54:14 - Relational & Boolean Operators
4:01:13 - Conditional Statements
4:10:13 - Lists
4:20:41 - Tuples
4:23:16 - Looping
4:28:18 - Importing Modules
4:34:24 - Advanced Strings
4:47:47 - Dictionaries
4:55:23 - Sockets
5:00:55 - Building a Port Scanner
5:21:09 - The 5 Stages of Ethical Hacking
5:26:31 - Passive Recon Overview
5:34:07 - Identifying Our Target
5:37:46 - Discovering Email Addresses
5:53:38 - Breached Credentials Part 1
6:01:00 - Breached Credentials Part 2
6:13:00 - Hunting Subdomains Part 1
6:18:35 - Hunting Subdomains Part 2
6:23:30 - Identifying Website Technologies
6:30:39 - Gathering Information w/ Burp Suite
6:39:33 - Google Fu
6:45:09 - Utilizing Social Media
6:50:49 - Installing Kioptrix
6:57:12 - Scanning w/ Nmap
7:17:04 - Enumerating HTTP/HTTPS Part 1
7:32:09 - Enumerating HTTP/HTTPS Part 2
7:47:22 - Enumerating SMB
8:01:46 - Enumerating SSH
8:05:59 - Researching Potential Vulnerabilities
8:20:54 - Our Notes So Far
8:24:03 - Scanning w/ Nessus Part 1
8:34:42 - Scanning w/ Nessus Part 2
8:40:57 - Reverse Shells vs Bind Shells
8:48:02 - Staged vs Non-Staged Payloads
8:51:27 - Gaining Root w/ Metasploit
8:59:13 - Manual Exploitation
9:11:57 - Brute Force Attacks
9:19:50 - Credential Stuffing & Password Spraying
9:33:58 - Our Notes, Revisited
9:37:05 - Capstone Introduction
9:42:54 - Setting up Blue
9:46:55 - Blue Walkthrough
10:04:00 - Academy Setup
10:06:28 - Academy Walkthrough
10:50:52 - Dev Walkthrough
11:16:18 - Butler Walkthrough
11:52:41 - Blackpearl Walkthrough
12:16:17 - Conclusion

@FM-jo1jh

You had me at "give back to the community"! Subscribed and will set time aside to watch the full 12 hrs. Thank you!

@bobbyscrelcher

this video lasted longer than my friends relationship.

@michaelb5299

Thanks for this! I finished an I.T. degree in 2009. I forgot 99% of it, so this was like a refresher. Networking was always my weak spot, and I struggled through the courses. I remember we were given an ip address for our final project, and had to network a fake company with 5000 pc's. I think I went a week without sleeping.

@Gritalus

you did a better job in explaining networking in an hour than my teacher did in 3 years on god and i wish she will see this comment one day

@barleymarrah7682

Hi everyone!  Am extremely excited and feel blessed to click on this video.  I know it super long, but so far....am loving every single second about it.  I always wanted to do something in the IT filed, but with my  busy  schedule...I was always contemplating on where do I start, what am I going to focus my studies on and how difficult will it be for me with no IT background? However, watching this video have answered to all the questions.  Thanks for taking your time to put this together for people like me.

@pimoens

Great course, but it would be very great to have the video segmented into chapters. For those of us who are familiar with the basics and looking for specific chapters, it would be amazing!

@epicinstrumentalmusic7967

Thank you for your time, as well as, creating such an "in-depth" layout of what will be expected. It was very informative and easy to follow. Again, thank you for this! Very much appreciated.

@chronosbat

I already know how to program through years of doing it but haven't really touched up on ethical hacking. It is very useful to know what is going on when you or someone else is being hacked, and I appreciate that this it is free course you have spent a long time making. Since I just want to learn the basics of ethical hacking to prevent some it, I don't really feel the need to buy paid ethical hacking courses. šŸ’–

@weidup

Hardly do training courses like this all the way through, but I'm almost 10 hours in and it's totally worth it!

@oduorotisjnr.e5723

I was able to watch the full video.  Very detailed descriptions, detailed ways on how to enumerate. šŸ’Æ I have learnt ALOT. Going for the next 12 hours now.

@detruncati4570

12 hours of knowledge in a YouTube video. Now this is something I will tolerate ads for. Great work šŸ‘

@iraqiaction

it has been a month and  I'm still watching , this course is amazing.

@vince.3220

5 stars are not enough to rate how amazing and how much effort was made to make this. Amazing Course.

@wiredogsec

This is absolute gold! Very practical and very affordable training. I highly recommend checking out the full course. You will definitely learn a lot! Thank you for all you do for the cybersecurity community!

@uncleskip229

Started the course yesterday just wrapping up. Thank You for giving back šŸ’ÆšŸ’Æ

@embazle

Having only listened to the first 30 mins I must say I’m extremely impressed with how the speaker challenges any individual to have the correct mindset in pursuing ethical hacking and pen-testing.