If you would like to learn ethical hacking in 2019, you are going to LOVE this course! We will cover the following topics:
How to setup a Linux system
Basic Unix system commands
How to create a secure penetration testing environment
Footprinting
Scanning
Website penetration testing
WPA2 wireless network cracking
Man in the middle attacks
System hacking
Python programming fundamentals
Writing our own pen-testing tools (reverse shell, keylogger and bruteforcer)
Tips for building a career in cyber security
This course was designed for absolute beginners, so no previous ethical hacking or programming knowledge is necessary. English subtitles (SRT-files) are available and all lectures are downloadable for offline viewing. 1 on 1 assistance with the tutorials is available within the discussion forum.

Introduction and Installation: 52m:
Introduction to the course – 04:40
VirtualBox installation – 15:36
Kali Linux installation – 13:54
Enabling full-screen – 18:16

Basic Linux Commands: 43m
Basic commands part 1 – 09:41
Basic commands part 2 – 21:04
Basic commands part 3 – 12:45

Creating a Secure Hacking Environment: 52m
Changing IP address and wireless adapter setup – 04:51
Creating a bootable Kali USB drive – 04:54
Essential networking terms – 10:15
Essential hacking terms – 17:58
Additional Kali tools to install – 08:30
Changing our MAC address with macchanger – 06:24

Footprinting: 54m
Google hacking – 13:08
Nikto basics – 10:55
Whois tool – 06:39
Email harvesting – 06:07
Shodan – 10:24
Zone transfer with Dig – 07:08

Scanning: 01h:51m
Installing Metasploitable – 06:58
Nmap part 1 – 15:32
Nmap part 2 – 11:43
Nmap part 3 – 12:24
Zenmap – 07:52
TCP scans – 15:50
Nmap bypassing defenses – 17:23
Nmap scripts part 1 – 09:28
Nmap scripts part 2 – 13:59

Website Penetration Testing: 04h:37m
Installing OWASP – 08:26
HTTP request – 09:57
HTTP response – 10:27
Burpsuite configuration – 12:49
Editing packets in Burpsuite – 12:20
Whatweb and Dirb – 10:10
Password recovery attack – 15:32
Burpsuite login bruteforce – 11:01
Hydra login bruteforce – 08:44
Session fixation – 13:51
Injection attacks – 05:31
Simple command injection – 11:04
Exploiting command injection vulnerability – 07:38
Finding blind command injection – 13:39
SQL basics – 10:21
Manual SQL injection part 1 – 13:12
Manual SQL injection part 2 – 20:49
SQLmap basics – 16:34
XML injection – 15:54
Installing XCAT and preventing injection attacks – 05:50
Reflected XSS – 10:46
Stored XSS – 11:56
Changing HTML code with XSS – 07:28
XSSer and XSSsniper – 13:32

WPA2 Wireless Cracking: 02h:24m
Wireless attacking theory – 10:49
Enabling monitor mode – 04:39
Capturing handshake with airodump – 14:35
RockYou.txt – 13:53
Cracking with Aircrack – 15:31
Cracking with Hashcat – 14:55
Creating password lists with Crunch – 18:20
Creating password lists with Cupp – 07:10
Rainbow tables part 1 – 16:34
Rainbow tables part 2 – 05:38
Installing Fluxion – 06:17
Finding and cracking hidden networks – 08:18
Preventing wireless attacks – 07:57

Man in the Middle Attacks: 01h:59m
ARP protocol basics – 10:28
Man in the middle attack theory – 07:18
Installing MITMf – 06:36
Manual ARP spoofing – 12:47
Problems while installing MITMf – 06:18
HTTP traffic sniffing – 08:29
DNS spoofing and HTTPS password sniffing – 24:18
Hooking browsers with BEEF – 16:01
Screenshotting targets browser – 11:00
Cloning any webpage – 08:53
Ettercap basics – 06:57

System Hacking: 04h:13m
MSFconsole environment – 16:05
Metasploit modules explained – 12:11
Bruteforcing SSH with Metasploit – 15:17
Attacking Tomcat with Metasploit – 08:49
Getting Meterpreter with command injection – 25:05
PHP code injection – 05:43
2 Metasploitable exploits – 06:57
Wine installation – 12:01
Creating Windows payloads with Msfvenom – 10:00
Encoders and Hex editor – 18:42
Windows 10 Meterpreter shell – 11:57
Meterpreter environment – 11:25
Windows 10 privilege escalation – 11:28
Preventing privilege escalation – 06:21
Post exploitation modules – 14:10
Getting Meterpreter over Internet with port forwarding – 10:39
Eternalblue exploit – 20:15
Persistence module – 13:14
Hacking over the internet with Ngrok – 10:24
Android device attack with Venom – 09:54
The real hacking begins now! – 02:25

Python Crash Course: 01h:46m
Variables – 13:40
Raw input – 10:46
If-else statements – 10:17
For loops – 06:30
While loops – 08:23
Python lists – 08:03
Functions – 14:33
Classes – 10:20
Importing libraries – 06:59
Files in Python – 11:42
Try and except rule – 05:11

Coding an Advanced Backdoor: 04h:13m
Theory behind reverse shells – 06:47
Simple server code – 12:40
Connection with reverse shell – 07:07
Sending and receiving messages – 10:46
Sending messages with while true loop – 07:52
Executing commands on target system – 09:37
Fixing backdoor bugs and adding functions – 20:08
First test using our backdoor – 17:59
Trying to connect every 20 seconds – 12:23
Creating persistence part 1 – 06:09
Creating persistence part 2 – 16:45
Changing directory – 11:51
Uploading and downloading files – 22:29
Downloading files from the internet – 22:42
Starting programs using our backdoor – 06:44
Capturing screenshot on the target PC – 18:43
Embedding backdoor in an image part 1 – 13:27
Embedding backdoor in an image part 2 – 08:37
Checking for administrator privileges – 12:10
Adding help option – 08:51

Creating a Keylogger for the Backdoor: 01h:29m
Importing Pynput – 10:19
Simple keylogger – 09:55
Adding report function – 10:32
Writing keystrokes to a file – 13:59
Adding the keylogger to our reverse shell part 1 – 22:59
Adding the keylogger to our reverse shell part 2 – 07:39
Final project test – 14:24

Basic Authentication Bruteforcer: 01h:20m
Printing banner – 11:19
Adding available options – 11:12
Starting threads for bruteforce – 08:23
Writing function to run the attack – 11:02
Bruteforcing router login – 09:37
Bypassing antivirus with your future programs – 13:41
Sending malware with spoofed email – 15:13

Building a Career in Cyber Security: 01h:25m
What will you learn in this section? – 02:33
Why is ethical hacking a valuable skill? – 23:00
What is the best ethical hacking certification? – 16:31
Tips for getting your first job as an ethical hacker? – 18:23
How I started my career as an ethical hacker? – 14:11
How to price your work? – 10:47