Completed
- Viewing, Creating, & Editing Files
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Ethical Hacking - Learn to Hack
Automatically move to the next video in the Classroom when playback concludes
- 1 - Introduction/whoami
- 2 - A Day in the Life of an Ethical Hacker
- 3 - Effective Notekeeping
- 4 - Important Tools
- 5 - Networking Refresher: Introduction
- 6 - IP Addresses
- 7 - MAC Addresses
- 8 - TCP, UDP, & the Three-Way Handshake
- 9 - Common Ports & Protocols
- 10 - The OSI Model
- 11 - Subnetting
- 12 - Installing VMWare / VirtualBox
- 13 - Installing Kali Linux
- 14 - Configuring VirtualBox
- 15 - Kali Linux Overview
- 16 - Sudo Overview
- 17 - Navigating the File System
- 18 - Users & Privileges
- 19 - Common Network Commands
- 20 - Network Commands Update
- 21 - Installing & Updating Tools
- 22 - Installing gedit
- 23 - Viewing, Creating, & Editing Files
- 24 - Scripting with Bash
- 25 - Intro to Python
- 26 - Strings
- 27 - Math
- 28 - Variables & Methods
- 29 - Functions
- 30 - Boolean Expressions
- 31 - Relational & Boolean Operators
- 32 - Conditional Statements
- 33 - Lists
- 34 - Tuples
- 35 - Looping
- 36 - Importing Modules
- 37 - Advanced Strings
- 38 - Dictionaries
- 39 - Sockets
- 40 - Building a Port Scanner
- 41 - The 5 Stages of Ethical Hacking
- 42 - Passive Recon Overview
- 43 - Identifying Our Target
- 44 - Discovering Email Addresses
- 45 - Breached Credentials Part 1
- 46 - Breached Credentials Part 2
- 47 - Hunting Subdomains Part 1
- 48 - Hunting Subdomains Part 2
- 49 - Identifying Website Technologies
- 50 - Gathering Information w/ Burp Suite
- 51 - Google Fu
- 52 - Utilizing Social Media
- 53 - Installing Kioptrix
- 54 - Scanning w/ Nmap
- 55 - Enumerating HTTP/HTTPS Part 1
- 56 - Enumerating HTTP/HTTPS Part 2
- 57 - Enumerating SMB
- 58 - Enumerating SSH
- 59 - Researching Potential Vulnerabilities
- 60 - Our Notes So Far
- 61 - Scanning w/ Nessus Part 1
- 62 - Scanning w/ Nessus Part 2
- 63 - Reverse Shells vs Bind Shells
- 64 - Staged vs Non-Staged Payloads
- 65 - Gaining Root w/ Metasploit
- 66 - Manual Exploitation
- 67 - Brute Force Attacks
- 68 - Credential Stuffing & Password Spraying
- 69 - Our Notes, Revisited
- 70 - Capstone Introduction
- 71 - Setting up Blue
- 72 - Blue Walkthrough
- 73 - Academy Setup
- 74 - Academy Walkthrough
- 75 - Dev Walkthrough
- 76 - Butler Walkthrough
- 77 - Blackpearl Walkthrough
- 78 - Conclusion