Curriculum
6 Sections
52 Lessons
Lifetime
Expand all sections
Collapse all sections
Section 1: 1 Kali Linux Crash Course
11
1.1
1. Variables
13 Minutes
1.2
2. Raw input
10 Minutes
1.3
3. If else statements
10 Minutes
1.4
4. For loops
6 Minutes
1.5
5. While loops
8 Minutes
1.6
6. Python lists
8 Minutes
1.7
7. Functions
14 Minutes
1.8
8. Classes
10 Minutes
1.9
9. Importing libraries
6 Minutes
1.10
10. Files in Python
11 Minutes
1.11
11. Try and except the rule
5 Minutes
Section 2: 2 Coding an Advanced Backdoor
20
2.1
12. Theory behind reverse shells
6 Minutes
2.2
13. Simple server code
12 Minutes
2.3
14. Connection with reverse shell
7 Minutes
2.4
15. Sending and receiving messages
10 Minutes
2.5
16. Sending messages with while true loop
7 Minutes
2.6
17. Executing commands on target system
9 Minutes
2.7
18. Fixing backdoor bugs and adding functions
20 Minutes
2.8
19. First test using our backdoor
18 Minutes
2.9
20. Trying to connect every 20 seconds
12 Minutes
2.10
21. Creating persistence part 1
6 Minutes
2.11
22. Creating persistence part 2
16 Minutes
2.12
23. Changing directory
11 Minutes
2.13
24. Uploading and downloading files
22 Minutes
2.14
25. Downloading files from the internet
22 Minutes
2.15
26. Starting programs using our backdoor
6 Minutes
2.16
27. Capturing screenshots on the target PC
18 Minutes
2.17
28. Embedding backdoor in an image part 1
13 Minutes
2.18
29. Embedding backdoor in an image part 2
8 Minutes
2.19
30. Checking for administrator privileges
12 Minutes
2.20
31. Adding help option
8 Minutes
Section 3: 3 Creating a Key logger for the Backdoor
7
3.1
32. Importing Pynput
12 Minutes
3.2
33. Simple keylogger
9 Minutes
3.3
34. Adding report function
10 Minutes
3.4
35. Writing key strokes to a file
14 Minutes
3.5
36. Adding the keylogger to our reverse shell part 1
22 Minutes
3.6
37. Adding the keylogger to our reverse shell part 2
7 Minutes
3.7
38. Final project test
14 Minutes
Section 4: 4 Basic Authentication Bruteforcer
7
4.1
39. Printing banner
11 Minutes
4.2
40. Adding available options
11 Minutes
4.3
41. Starting threads for bruteforce
8 Minutes
4.4
42. Writing function to run the attack
11 Minutes
4.5
43. Bruteforcing router login
9 Minutes
4.6
44. Bypassing antivirus with your future programs
13 Minutes
4.7
45. Sending malware with spoofed email
15 Minutes
Section 5: 5 BONUS - Building a Career in Cyber Security
6
5.1
46. What will you learn in this section
2 Minutes
5.2
47. Why is ethical hacking a valuable skill
23 Minutes
5.3
48. What is the best ethical hacking certification
16 Minutes
5.4
49. Tips for getting your first job as an ethical hacker
18 Minutes
5.5
50. How I started my career as an ethical hacker
14 Minutes
5.6
51. How to price your work
10 Minutes
Section 6: 6 Additional Content: Grand Finale
1
6.1
52. Bonus Lectures. Enjoy the Benefits
Ethical Hacking with Kali Linux Tailor Made: Advanced
Search
This content is protected, please
login
and enroll in the course to view this content!
Modal title
Main Content