-
What is Ethical Hacking & Cybersecurity
- Introduction
- Difference
- Importance
- What to Learn
-
The Ethical Hacker Methodology
- Recon with kali linux tools
- Scanning with Nmap
- Gaining Access with Metasploit
- Maintaining Access
- Clearing Tracks
-
Anonymous Browsing
- What is Proxy -Server
- What is VPN
- What is TOR
- Changing MAC address
- Changing DNS
- About Dark-Deep Web
-
Basics of Networkings
-
How to crack password using Hashcat
-
Wifi-Hacking
-
How to practice further and boost up skills & Resources
Spacial Help: Doubt Cleaning Sessions & Mentoring