Ethical Hacking: Video Companion
Published 7/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.43 GB | Duration: 7h 21m
Published 7/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.43 GB | Duration: 7h 21m
Video companion course for the Ethical Hacking book by Daniel Graham
What you'll learn
Understand fundamental ethical hacking concepts, methodologies, and the hacker mindset, aligning theory with practical techniques demonstrated in the videos.
Master the setup, configuration, and effective use of essential ethical hacking tools discussed in the textbook through guided video tutorials.
Apply penetration testing skills to realistic scenarios by following hands-on demonstrations that enhance the examples and labs from the textbook.
Develop skills in identifying, exploiting, and mitigating common security vulnerabilities by combining video instruction with structured reading
Requirements
Some programming experience in python
Description
This course is a video-based companion to the bestselling book Ethical Hacking: A Hands-On Introduction to Breaking In. It is specifically designed to follow the structure and flow of the book, providing students with guided walkthroughs, live demonstrations, and extended insights into the tools, concepts, and techniques discussed throughout the text. Each video module aligns with a chapter in the book, allowing learners to reinforce and deepen their understanding through visual explanations and practical, step-by-step examples.Students are required to purchase the book, as it serves as the foundational reference for all lectures, lab activities, and assignments. The book contains critical details, code samples, and exercises that are not fully reproduced in the videos. Rather than replacing the book, this course is intended to enhance the learning experience, making complex material more approachable and actionable. You can purchase the book: Ethical Hacking: A Hands-on Introduction to Breaking In by Daniel GrahamWhether you are a student, aspiring ethical hacker, or cybersecurity enthusiast, this course will help you build confidence and practical skills by engaging with real-world hacking tools in a legal and controlled environment. By combining the strengths of video instruction and written material, this course provides a complete and immersive learning journey into the world of ethical hacking.
Overview
Section 1: Introduction
Lecture 1 Introduction
Section 2: Fundamentals
Lecture 2 Chapter - 1 - Setting Up Your environment
Lecture 3 Chapter - 2- ARP Spoofing
Lecture 4 Chapter - 3- Part-1- Portocols and Ports
Lecture 5 Chapter -3- Part 2- Wireshark Analysis
Lecture 6 Chapter -4- Part 1 - TCP and Sockets
Lecture 7 Chapter -4- Part -2 Botnets and Shells
Section 3: Encryption
Lecture 8 Chapter 5 - Part -1 - Block -Ciphers
Lecture 9 Chapter 5 - Part -2 - Ransomeware
Lecture 10 Chapter 5 - Part -3- PGP
Lecture 11 Chapter 6 - Part - 1 - TLS
Lecture 12 Chapter 6 - Part -2 -Diffie–Hellman key exchange
Section 4: Social Engineering
Lecture 13 Chapter 7 - Part 1 - Fake Emails
Lecture 14 Chapter 7 - Part 2 - Fake Sites
Lecture 15 Chapter 8 Part 1 Link Analysis
Lecture 16 Chapter 8 Part 2 Scanning and Exploitation
Section 5: Exploitation
Lecture 17 Chapter 9 Part -1- Heartbleed Case Study
Lecture 18 Chapter 9 Part - 2- Fuzzing
Lecture 19 Chapter 9 Part 3 Dynamic Symbolic Execution
Lecture 20 Chapter 10 - Part 1- Trojans
Lecture 21 Chapter 10 Part 2 - Encoding
Lecture 22 Chapter 11 - Part 1 - Kernel Modules and Rootkits
Lecture 23 Chapter 11 Part 2 - System Calls
Section 6: Attacking Web Apps
Lecture 24 Chapter 12 - Part 1 - Understand SQL Injection
Lecture 25 Chapter 12 - Part 2 - SQL Inject Attack Demo
Lecture 26 Chapter 12 - Part 3 - Understanding MD5 Hashes
Lecture 27 Chapter 13 - Part 1- XSS Beef
Lecture 28 Chapter 13 - Part 2 - From the browser to the OS
Beginners in cyber security.