Bitten Tech | TechHacker Pre-Hacking Complete Course
Let me clear first thing if you watch all videos of these course then no one can
stopped you to become ethical hacker
💢 Course Curriculum :
Introduction
[1.1] Introduction to Information Security
[1.2] Information-Security-Threats
[1.3] Introduction to Cyber Security
[1.4] The CIA Triad
[1.5] Who are Hackers
[1.6] Types of Hackers
[1.7] Introduction to Ethical Hacking
[1.8] Information Warfare
[1.9] Need for Ethical Hackers
[1.10] Careers in Ethical Hacking
[1.11] Course Overview
[1.12] General Terminologies
[1.13] How To become an Ethical Hacker
Module 1 Study Materials
Basics and Environment setup
[2.1] Advantages and Limitations of Cyber Security
[2.2] Cyber Defense
[2.3] Skills of an Ethical Hacker
[2.4] Information Security Policies
[2.5] Vulnerability Research
[2.6] Introduction to OS Linux and it’s Evolution
[2.7] Major Linux Distributions
[2.8] Advantages of linux
[2.9] Linux for Penetration Testing
[2.10] Types of Hackers contd
[2.11] Phases of Ethical Hacking
[2.12] Introduction to Penetration Testing
[2.13] Phases of Penetration Testing
[2.14] Cyber Security vs Ethical Hacking
[2.15] Ethical Hacking Laws and Policies
[2.16] IT Act 2000
[2.17] Risk Management and Methodology
[2.18] Software and Hardware Requirements for a Hacking Lab
[2.19] Installing and Configuring VMWare WS
[2.20] Dual boot vs Virtual Machine
[2.21] Choosing and Downloading Kali Distro
[2.22] Configuring VM For Kali Linux
[2.23] Installing Kali Linux 2019.4 on VMWare (New)
[2.24] Virtual Network Configurations Explained – NAT vs Bridged vs Host Only vs Internal
[2.25] Installating and Configuring DVWA
[2.26] Installating and Configuring bWAPP
[2.27] Installing Metasploitable on VM
[2.28] Installing OWASP Broken Web Application on VMWare
Module 2 Study Materials
Linux Refresher
[3.1] Introduction to Command Line
[3.2] Windows command line
[3.3] Linux command line
[3.4] Linux File System
[3.5] NTFS vs FAT vs EXT
[3.6] Linux User Administration
[3.7] Basic DOS Commands
[3.8] DOS Networking Commands
[3.9] Kali 2019.4 and linux file system overview
[3.10] Linux Elementary Commands
[3.11] Linux Networking Commands
[3.12] history and grep command
[3.13] Working with Linux User Administration
[3.14] Linux Working with Files, Permissions and Directories
[3.15] Working with Linux File Permissions
[3.16] Linux Working with Groups
[3.17] Linux Package Manager apt
[3.18] Linux Useful Files
Module 3 Study Materials
Networking Refresher
[4.1] The OSI Model – Open Systems Interconnection
[4.2] More on OSI Model – Introduction to TCP-IP Model
[4.3] TCP-IP v-s OSI – The Difference
[4.4] Data Link Layer and MAC Addresses
[4.5] Network Layer and IP Addresses
[4.6] Classful IP Addressing, Private and Special Addresses
[4.7] Classless IP Addressing
[4.8] Transport Layer
[4.9] Ports and Port Addressing
[4.10] Proxies and Proxy Servers
[4.11] Introduction to TOR
[4.12] Introduction to VPN
[4.13] Remote Login – SSH and telnet
[4.14] Introduction to NAT and Port Forwarding
Module 4 Study Material
Footprinting and Reconnaissance
[5.1] Introduction to Footprinting and Objectives
[5.2] Footprinting through search Engines
[5.3] Introduction to OSINT
[5.4] Email Footprinting
[5.5] Website Footprinting
[5.6] Competitive Intelligence
[5.7] Internet Archive
[5.8] wget Mirroring
[5.9] Website Mirroring with httrack
[5.10] whois lookup
[5.11] Introduction to DNS Footprinting
[5.12] DNS Resource Records
[5.13] DNS Footprinting with DNS Dumpster
[5.14] dns.google.com
[5.15] Network Footprinting
[5.16] Introduction and Working of Traceroute
[5.17] Traceroute Analysis
[5.18] Introduction to Maltego
[5.19] Maltego Information Gathering with domain name
[5.20] Maltego Information Gathering with IP Address
[5.21] Maltego Using the Tool Efficiently
[5.22] Maltego Tranform Hub
[5.23] Maltego Integration with Shodan
[5.24] OSINT Framework
[5.25] theHarvester
[5.26] Shodan Introduction and First Look
[5.27] Shodan Advanced Search with Dorks
[5.28] WhatWeb
[5.29] Wappalyzer
[5.30] sublist3r
[5.31] Subdomain Finder Websites
[5.32] netdiscover
[5.33] Major IP Block
[5.34] Google Dorks Explained – What is Google Hacking
[5.35] Working with Google Dorks – Google Dorking Practical
[5.36] Footprinting with Social Engineering
[5.37] Footprinting Countermeasures
Module 5 Study Material
Scanning
[6.1] Basics of Scanning
[6.2] Scanning Methodology
[6.3] Working with ping command for live hosts
[6.4] Angry IP Scanner
[6.5] TCP Flags
[6.6] TCP 3-Way Handshake
[6.7] Introduction to Port Scanning
[6.8] Port Scanning Methodology
[6.9] Types of Port Scanning – TCP Connect Scan
[6.10] Types of Port Scanning – TCP Stealth Scan
[6.11] Types of Port Scanning – TCP Inverse Flag Scanning
[6.12] Types of Port Scanning – TCP Xmas Scan
[6.13] Types of Port Scanning – ACK Flag Probe Scanning
[6.14] Types of Port Scanning – UDP Scan
[6.15] Introduction to Nmap and First Look
[6.16] Nmap – Port Scanning
[6.17] Nmap – Advanced Port Scanning
[6.18] Nmap – Bypass Firewalls and IDS
[6.19] Nmap – Types of Scans
[6.20] Port Scanning with hping3
[6.21] Port Scanning with pentest-tools
[6.22] Colasoft Packet Builder
[6.23] Introduction to Banner Grabbing
[6.24] Banner Grabbing with ID Serve
[6.25] Banner Grabbing with NetCraft
[6.26] Banner Grabbing with netcat
[6.27] Evading IDS and Firewalls
[6.28] Scanning for Vulnerabilities
[6.29] Nessus Vulnerability Scanner
[6.30] Nmap Scripting Engine
[6.31] nikto Web Vulnerability Scanner
[6.32] OpenVas Installation and Configuration
[6.33] Vulnerability Scanning with OpenVas
[6.34] WordPress Vulnerability Scanning with wpscan
[6.35] Mapping Networks
[6.36] Network Topology Mapper
[6.37] Spiceworks Network Mapper
[6.38] LAN State Pro
[6.39] Scanning Countermeasures
Module 6 Study Materials
Enumeration
[7.1] Introduction to Enumeration
[7.2] Techniques of Enumeration
[7.3] NetBIOS enumeration
[7.4] SMB Enumeration
[7.5] Working wiith NetBIOS and SMB Enumeration
[7.6] SNMP Enumeration
[7.7] LDAP Enumeration
[7.8] SMTP Enumeration
[7.9] Working with SMTP Enumeration
[7.10] DNS Enumeration
[7.11] Introduction to DNS Zones
[7.12] Introduction to DNS Zone Transfer
[7.13] DNS Zone Transfer using host command
[7.14] nslookup tool
[7.15] DNS Zone Transfer using nslookup
[7.16] dig command
[7.17] DNS Zone Transfer using dig command
[7.18] NTP Enumeration
[7.19] Enumeration Countermeasures
Module 7 Study Materials
BONUS Section
Port Scanning: Introduction to Masscan
🔹Iɴғᴏʀᴍᴀᴛɪᴏɴ :
🖥 Video Language :- Hindi
📦 Size :- 10 GB
💵 Price :- 1500 INR
💸 Our Price:- Free ❤️
Click here to download