Completed
- Introduction/whoami
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack
Automatically move to the next video in the Classroom when playback concludes
- 1 - Introduction/whoami
- 2 - A Day in the Life of an Ethical Hacker
- 3 - Effective Notekeeping
- 4 - Important Tools
- 5 - Networking Refresher: Introduction
- 6 - IP Addresses
- 7 - MAC Addresses
- 8 - TCP, UDP, & the Three-Way Handshake
- 9 - Common Ports & Protocols
- 10 - The OSI Model
- 11 - Subnetting, Part 1
- 12 - Subnetting, Part 2
- 13 - Installing VMWare / VirtualBox
- 14 - Installing Kali Linux
- 15 - Configuring VirtualBox
- 16 - Kali Linux Overview
- 17 - Sudo Overview
- 18 - Navigating the File System
- 19 - Users & Privileges
- 20 - Common Network Commands
- 21 - Viewing, Creating, & Editing Files
- 22 - Starting and Stopping Services
- 23 - Installing and Updating Tools
- 24 - Bash Scripting
- 25 - Intro to Python
- 26 - Strings
- 27 - Math
- 28 - Variables & Methods
- 29 - Functions
- 30 - Boolean Expressions and Relational Operators
- 31 - Conditional Statements
- 32 - Lists
- 33 - Tuples
- 34 - Looping
- 35 - Advanced Strings
- 36 - Dictionaries
- 37 - Importing Modules
- 38 - Sockets
- 39 - Building a Port Scanner
- 40 - User Input
- 41 - Reading and Writing Files
- 42 - Classes and Objects
- 43 - Building a Shoe Budget Tool
- 44 - The 5 Stages of Ethical Hacking
- 45 - Passive Recon Overview
- 46 - Identifying Our Target
- 47 - Discovering Email Addresses
- 48 - Breached Credentials Part 1
- 49 - Breached Credentials Part 2
- 50 - End Part 1