Course curriculum

  • 1

    Prerequisites to Take the course

    • Welcome

    • Thank you for taking this course! What is the most it can do for you?

    • Prerequisites success tips for getting the most out of this course.

  • 2

    Getting Started

    • Basic terminology such as white hat, grey hat, and black hat hacking.

    • Basic terminology including SQL injections, VPN , proxy, VPS, and key loggers. Preview

  • 3

    Building your Environment for Hacking

    • Getting started successfully PDF with common questions answered and helpful tips

    • Installing VirtualBox with rpm plus why use a virtual machine.

    • Installing VirtualBox using the default package manager from repositories

    • Creating the virtual environment.

    • Installing VirtualBox in a Windows environment

    • Kali Linux installation within a virtual environment

    • Kali Linux installation after it is running and getting starting using it.

    • Installing VirtualBox Guest Additions

  • 4

    Create bootable USB

    • How to create a bootable USB of Kali with persistent storage > 4 GB part 1

    • How to create a bootable USB of Kali with persistent storage > 4 GB part 2

    • How to create a bootable USB of Kali with persistent storage > 4 GB part 2

    • How to create a bootable USB of Kali with persistent storage > 4 GB part 3

    • How to create a bootable USB of Kali with persistent storage - 4 GB part 4

    • How to create a bootable USB of Kali with persistent storage > 4 GB part 4

  • 5

    Linux terminal basic functionalities and CLI

    • Introduction to the Linux terminal.

    • Linux Command-Line Interface (CLI) basics.

    • The Linux CLI explained in greater detail to give you a good understanding.

  • 6

    In-depth TOP

    • Tor part 1

    • Tor part 2

  • 7

    Proxychains

    • Proxychains part 1.

    • Proxychains part 2

    • Proxychains part 3

  • 8

    In-Depth VPN

    • VPN part 1

    • VPN part 2