Ethical Hacking (For Beginners)
Understand the History, Basic concepts, and overview about Kali Linux and its tools.
Introduction
Types of Hacker
White Hat Hacking
How it all started?
Phreakers and tiger teams
Rise of the black hat hacker
Sophisticated modern cybercriminals
The renaissance
John Draper
Frederick B. Cohen
Kevin Mitnick
Tsutomu Shimomura
Richard Stallman
Phases
Phase 1: Reconnaissance
Phase 2: Scanning
Phase 3: Gaining Access
Phase 4: Maintaining Access
Phase 5: Clearing Tracks
Kali Linux Introduction
Information Gathering Tools
Vulnerability Analsysis Tools
Wireless Attacks
Web Applications
Exploitation Tools
Stress testing
Forensic Tools
Sniffing and Spoofing
Password Attacks
Maintaining Access
Reverse Engineering
Reporting Tools
Hardware Hacking