I'm only 1.5 hours into the course and this was hands down the best explanation I've seen on internet on subnetting so far. Amazing material
I must say as a Network Engineer myself, that subnet sheet is very useful!
0:00 - Introduction/whoami 6:20 - A Day in the Life of an Ethical Hacker 23:14 - Effective Notekeeping 29:58 - Important Tools 35:23 - Networking Refresher: Introduction 36:39 - IP Addresses 49:50 - MAC Addresses 53:07 - TCP, UDP, & the Three-Way Handshake 58:25 - Common Ports & Protocols 1:04:39 - The OSI Model 1:10:14 - Subnetting 1:37:17 - Installing VMWare / VirtualBox 1:43:37 - Installing Kali Linux 1:50:11 - Configuring VirtualBox 1:53:32 - Kali Linux Overview 1:57:05 - Sudo Overview 2:02:22 - Navigating the File System 2:14:26 - Users & Privileges 2:23:54 - Common Network Commands 2:29:50 - Network Commands Update 2:31:49 - Installing & Updating Tools 2:41:01 - Installing gedit 2:42:46 - Viewing, Creating, & Editing Files 2:48:49 - Scripting with Bash 3:11:28 - Intro to Python 3:13:52 - Strings 3:21:25 - Math 3:27:24 - Variables & Methods 3:38:41 - Functions 3:49:40 - Boolean Expressions 3:54:14 - Relational & Boolean Operators 4:01:13 - Conditional Statements 4:10:13 - Lists 4:20:41 - Tuples 4:23:16 - Looping 4:28:18 - Importing Modules 4:34:24 - Advanced Strings 4:47:47 - Dictionaries 4:55:23 - Sockets 5:00:55 - Building a Port Scanner 5:21:09 - The 5 Stages of Ethical Hacking 5:26:31 - Passive Recon Overview 5:34:07 - Identifying Our Target 5:37:46 - Discovering Email Addresses 5:53:38 - Breached Credentials Part 1 6:01:00 - Breached Credentials Part 2 6:13:00 - Hunting Subdomains Part 1 6:18:35 - Hunting Subdomains Part 2 6:23:30 - Identifying Website Technologies 6:30:39 - Gathering Information w/ Burp Suite 6:39:33 - Google Fu 6:45:09 - Utilizing Social Media 6:50:49 - Installing Kioptrix 6:57:12 - Scanning w/ Nmap 7:17:04 - Enumerating HTTP/HTTPS Part 1 7:32:09 - Enumerating HTTP/HTTPS Part 2 7:47:22 - Enumerating SMB 8:01:46 - Enumerating SSH 8:05:59 - Researching Potential Vulnerabilities 8:20:54 - Our Notes So Far 8:24:03 - Scanning w/ Nessus Part 1 8:34:42 - Scanning w/ Nessus Part 2 8:40:57 - Reverse Shells vs Bind Shells 8:48:02 - Staged vs Non-Staged Payloads 8:51:27 - Gaining Root w/ Metasploit 8:59:13 - Manual Exploitation 9:11:57 - Brute Force Attacks 9:19:50 - Credential Stuffing & Password Spraying 9:33:58 - Our Notes, Revisited 9:37:05 - Capstone Introduction 9:42:54 - Setting up Blue 9:46:55 - Blue Walkthrough 10:04:00 - Academy Setup 10:06:28 - Academy Walkthrough 10:50:52 - Dev Walkthrough 11:16:18 - Butler Walkthrough 11:52:41 - Blackpearl Walkthrough 12:16:17 - Conclusion
You had me at "give back to the community"! Subscribed and will set time aside to watch the full 12 hrs. Thank you!
this video lasted longer than my friends relationship.
Thanks for this! I finished an I.T. degree in 2009. I forgot 99% of it, so this was like a refresher. Networking was always my weak spot, and I struggled through the courses. I remember we were given an ip address for our final project, and had to network a fake company with 5000 pc's. I think I went a week without sleeping.
you did a better job in explaining networking in an hour than my teacher did in 3 years on god and i wish she will see this comment one day
Hi everyone! Am extremely excited and feel blessed to click on this video. I know it super long, but so far....am loving every single second about it. I always wanted to do something in the IT filed, but with my busy schedule...I was always contemplating on where do I start, what am I going to focus my studies on and how difficult will it be for me with no IT background? However, watching this video have answered to all the questions. Thanks for taking your time to put this together for people like me.
Great course, but it would be very great to have the video segmented into chapters. For those of us who are familiar with the basics and looking for specific chapters, it would be amazing!
Thank you for your time, as well as, creating such an "in-depth" layout of what will be expected. It was very informative and easy to follow. Again, thank you for this! Very much appreciated.
I already know how to program through years of doing it but haven't really touched up on ethical hacking. It is very useful to know what is going on when you or someone else is being hacked, and I appreciate that this it is free course you have spent a long time making. Since I just want to learn the basics of ethical hacking to prevent some it, I don't really feel the need to buy paid ethical hacking courses. š
Hardly do training courses like this all the way through, but I'm almost 10 hours in and it's totally worth it!
I was able to watch the full video. Very detailed descriptions, detailed ways on how to enumerate. šÆ I have learnt ALOT. Going for the next 12 hours now.
12 hours of knowledge in a YouTube video. Now this is something I will tolerate ads for. Great work š
it has been a month and I'm still watching , this course is amazing.
5 stars are not enough to rate how amazing and how much effort was made to make this. Amazing Course.
This is absolute gold! Very practical and very affordable training. I highly recommend checking out the full course. You will definitely learn a lot! Thank you for all you do for the cybersecurity community!
Started the course yesterday just wrapping up. Thank You for giving back šÆšÆ
Having only listened to the first 30 mins I must say Iām extremely impressed with how the speaker challenges any individual to have the correct mindset in pursuing ethical hacking and pen-testing.
@TCMSecurityAcademy