Course Content

    1. Course Overview

    1. Introduction to Networking Lecture 1

    2. Basic Terminology of Network Lecture 2

    3. Basic Terminologies of Networking Lecture 3

    4. Local Area Network Lecture 4

    5. Wide Area Network Lecture 5

    6. Cloud Network Lecture 6

    7. Network Devices Lecture 7

    8. IP address Lecture 8

    9. Mac Address Lecture 9

    10. Network protocols Lecture 10

    11. Lecture 11 http

    12. Lecture 12 https protocol

    13. Lecture 13 Tcp and UDP protocols

    14. Lecture 14 OSI Model

    15. Lecture 15 OSI Model

    16. Lecture 16 OSI Model

    17. Lecture 17 OSI Model

    18. Lecture 18 Cisco packet tracer

    19. Lecture 19 Router Basic configuration

    20. Lecture 20 Lab

    21. Lecture 21 Lab

    1. Lecture 0 Hacking theory

    2. Lecture 1 VMware installation

    3. Lecture 2 Kali Linux installation

    4. Lecture 3 Linux operating system

    5. Lecture 4 Linux Basic commands

    6. Lecture 5 Linux Basic Commands

    7. Lecture 6 Linux Basic commands

    8. Lecture 7 pdf file of Basic commands

    9. Lecture 7 second Pdf file of Basic commands

    10. Lecture 8 File permission in Linux

    11. Lecture 9 File permission in Linux Practical

    12. Lecture 9 PDF of File permission

    13. Lecture 10 How to install Centos in VMware

    14. Lecture 11 Centos installation

    15. Lecture 12 Data backup and compression

    16. Lecture 13 Centos Password Cracking theory

    17. Lecture 14 Centos password cracking

    18. Lecture 15 How to Download tools for Linux

    19. Lecture 16 Phishing attack theory

    20. Lecture 17 Phishing attack practical

    21. Lecture 18 Man-in-middle Attack theory

    22. Lecture 19 Man-in-middle Attack practical

    23. Lecture 20 Location Hacking Ethically

    24. Lecture 21 Location Hacking Practical

    25. Lecture 22 Seeker and Ngrok configuration

    26. Lecture 23 SQL injection attack theory

    27. Lecture 24 SQL Injection attack Practical

    28. Lecture 25 SQL injection attack commands

    29. Lecture 26 Brute Force attack theory

    30. Lecture 27 Software for Brute forcing attack

    31. Lecture 28 Brute force practical attack

    32. Lecture 29 Metasploit Vulnerable machine

    33. Lecture 30 Metasploit Machine installation

    34. Lecture 31 Nmap tool theory

    35. Lecture 32 Nmap tool pdf

    36. Lecture 33 Nmap tool Lab 1

    37. Lecture 34 Nmap tool Lab 2

    38. Lecture 35 Nmap tool Lab 3

    39. Lecture 36 Nmap tool lab 3 end

    40. Lecture 37 XSS Vulnerability theory

    41. Lecture 38 XSS Lab

    42. Last Lecture

About this course

  • £35.00
  • 65 lessons
  • 8 hours of video content
  • پشتو

What You Will Learn

  • Ethical Hacking Fundamentals: Gain a solid understanding of the principles of ethical hacking, including its role in cybersecurity.

  • Network Security: Learn how to secure networks, identify vulnerabilities, and defend against cyber attacks.

  • Vulnerability Exploitation: Master the techniques to ethically exploit vulnerabilities in systems and networks, using real-world hacking tools.

  • Penetration Testing: Conduct penetration tests to assess the security of systems and identify potential risks.

  • Data Protection: Understand how to safeguard sensitive information, implementing strategies to protect against breaches.

  • Cybersecurity Best Practices: Learn the latest cybersecurity practices to protect systems from evolving threats.

Who Is This Course For?

  • Beginners in Cybersecurity

    Ideal for individuals with no prior experience who want to start a career in ethical hacking and cybersecurity. Learn from scratch and build a strong foundation.

  • IT Professionals & Network Administrators

    Perfect for those already working in IT who want to enhance their skills by learning how to ethically exploit vulnerabilities and strengthen their networks.

  • Aspiring Ethical Hackers & Penetration Testers

    Designed for those looking to specialize in ethical hacking or penetration testing. This course provides hands-on experience to prepare for real-world IT security roles.