September 8, 2022 at 5:15 PM
1. Introduction
2. Hacking Lab Setup
3. Kali Linux 101
4. Anonymity Online
5. Dark Web
6. Network Pentesting
7. Gathering Information From Networks
8. Wireless Attacks
9. Post Connection Attacks
10. System Pentesting
11. Attacks On Users
12. Social Engineering
13. Social Media Security
14. Beef
15. External Network Attacks
16. Fake Game Website Attacks
17. Post Hacking Sessions
18. Hacker Methodology
19. Website Reconnaissance
20. Website Pentesting
21. Cross Site Scripting
22. SQL 101
23. SQL Injection
24. Website Pentesting Tools
25. Ethical Hacking Certifications
26. Network Theory
27. Python For Ethical Hacking Setup
28. Python Data Types & Structures
29. Control Statements & Loops
3
