Section 1 : Real-World Ethical Hacking 1 Hacking Windows!

Lecture 1 Introduction 1:1
Lecture 2 Overview What is Ethical Hacking 11:15
Lecture 3 Hacking Windows 2:8
Lecture 4 The Sticky Keys Hack 2:31
Lecture 5 Burning a Legal Windows 10 Install Disc 3:54
Lecture 6 The Hack First Reboot and Exploit 4:37
Lecture 7 The Hack (cont.) Second Reboot and Compromise 6:56
Lecture 8 Hack Finale Logging in as Administrator 6:56
Lecture 9 Review 4:10
Lecture 10 BONUS Mac Root Hack 8:33

Section 2 : Create Your Own Virtual Hacking Lab!

Lecture 11 Virtual Lab Intro and VirtualBox Installation. 5:8
Lecture 12 Building a Kali Linux Virtual Machine 6:33
Lecture 13 Create a Windows 10 VM 7:40
Lecture 14 Create an Android PhoneTablet VM for Mobile Ha 10:38
Lecture 15 The Ultimately Hackable Metasploitable 5:43
lecture 16 Troubleshooting VirtualBox on Mac-Windows Text

Section 3 : Important Linux and Windows Terminal Commands

Lecture 17 Intro to Command-Line Linux and Windows 1:27
Lecture 18 Basic Linux Commands 7:37
Lecture 19 Command-Line Linux File Magic 6:3
Lecture 20 More Helpful Linux Commands 6:59
Lecture 21 BONUS Fun Linux Terminal Commands (Optional). 11:27
Lecture 22 Basic Command-Line Commands for Windows 4:57
Lecture 23 Windows File Commands 4:58
Lecture 24 Advanced Windows Command-Line Commands 4:58
Lecture 25 Command-Line Review for Linux and Windows 5:0

Section 4 : Create a Virtual Network for Ethical Hacking!

Lecture 26 Virtual Networking in VirtualBo 3:51
Lecture 27 Creating the Private, Host-Only 10.0.3.x Netwo 6:46
Lecture 28 Connecting Your VMs to the Host-Only Network. 9:49
Lecture 29 Creating and Using a Public NAT Network in VBo 7:34
Lecture 30 Updating Kali and Windows VMs 7:2

Section 5 : Social Engineering Capturing Usernames and Passwo

Lecture 31 Intro to Social Engineering 7:50
Lecture 32 Fixing SET on Kali 2020 and later 3:52
Lecture 33 The Social Engineer's Toolkit in Kali Linux 4:30
Lecture 34 Cloning Facebook and Harvesting User Passwords 9:52
Lecture 35 Intro to Spear-Phishing. 6:13
Lecture 36 Advanced IP Address Masking Hiding Your Real U 8:14
Lecture 37 Crafting the Perfect Spear-Phishing Email 7:47
Lecture 38 Capturing the User's Login and Password in Kal 7:51
Lecture 39 BONUS Cloning Twitter - Easy as 1-2-3-2! 3:19
Lecture 40 Review Social Engineering Techniques 7:25
Lecture 41 Stopping Phishing at Work and at Home. 8:59

Section 6 : Recon Information Gathering, Scanning and Enumera

Lecture 42 Information Gathering Passive vs. Active Recon 3:41
Lecture 43 OSINT (Open-Source INTelligence) Framework Dom 4:56
Lecture 44 theHarvester How hackers find users and email 10:21
Lecture 45 Recon-ng Enumeration of servershosts with Reco 5:56
Lecture 46 nmap Active Scanning with nmap 10:6
Lecture 47 Legion Active network and vulnerability scanni

Section 7 : Remote Hacking Win10 Attack Phase

Lecture 48 Hacking Win10 The Attack Phase
Lecture 49 Intro to Metasploit The Hacker's Swiss Army Kn 3:52
Lecture 50 Creating Your Own Virus with Metasploit
Lecture 51 Sharing the Malware over the Web 4:13
Lecture 52 Prep Win10 for Hacking USB, WebCam, Firewall a 6:25
Lecture 53 Infecting Your Windows 10 VM with the Virus 8:6

Section 8 : Hacking Win10 Command & Control Phase

Lecture 54 Attack Phase RecapReconnecting in Meterpreter. 7:7
Lecture 55 Intro to Meterpreter Your Remote Attack Shell! 5:40
Lecture 56 Viewing, Downloading and Uploading Files with 5:16
Lecture 57 Stealing Screenshots, Keystrokes, and ,Webcams 10:20
Lecture 58 How Attackers Steal Windows 10 Passwords Privi 13:23
Lecture 59 Defending Yourself from Malware Attacks 8:29

Section 9 : BONUS Section Car Hacking in Kali Linux!

Lecture 60 Intro to Car Hacking! 4:34
Lecture 61 Update Installing can-utils and ICSim on Kali 7:48
Lecture 62 Running the Car Dashboard Simulator ICSim 8:0
Lecture 63 Capturing CAN Traffic with CanSniffer 5:49
Lecture 64 The Replay Attack Replaying CAN Packets with C 7:13
Lecture 65 Car Hacking Review 7:46
Lecture 66 BONUS Reverse Engineering the CAN Bus 13:51
Lecture 67 BONUS Hacking the Car Hacking Software, to 100 11:27
Lecture 68 Car Hacking LIVE on Dr. Payne's VW Jetta Faceb 9:44

Section 10 : BONUS Hacking Windows 7 with Metasploit!

Lecture 69 Intro to Hacking a Real Win7 Box 4:13
Lecture 70 Intro to Metasploit 3:55
Lecture 71 Setting up Guest Additions in VirtualBox 6:46
Lecture 72 Creating an Exploit Payload with Metasploit 6:15
Lecture 73 Sharing the Exploit over the Web 4:42
Lecture 74 Running the Exploit to Hack Windows 7 4:35
Lecture 75 Intro to Meterpreter Your Remote Attack Shell!
Lecture 76 Privilege Escalation Gaining Root Access and D 9:5
Lecture 77 Metasploit & Meterpreter Review 4:30

Section 11 : Password Problems - Everybody's Got 'Em Hacking,

Lecture 78 Six Problems with Passwords 4:27
Lecture 79 Hijacking Stored Passwords from Chrome and Fir 8:15
Lecture 80 Sniffing the Network Installing Wireshark 6:53
Lecture 81 Sniffing Unencrypted Passwords with Wireshark. 7:58
Lecture 82 Cracking Passwords with Kali and Online Tools. 9:8
Lecture 83 Seven Things You Can Do for Safer Passwords 8:58

Section 12 : Web Hacking - Testing and Securing Web Applicati

Lecture 84 Intro to Web Hacking 3:49
Lecture 85 Hands-on Cross-Site Scripting (XSS) Attacks Th 8:21
Lecture 86 SQL (Structured Query Language) Injection Mess 4:7
Lecture 87 Advanced SQLi Attacks 6:1
Lecture 88 Securing Web Applications from XSS, SQLi and M 5:56

Section 13 : Mobile Hacking on Android

Lecture 89 Exploiting Android from Kali Linux using Meter 1:45
Lecture 90 Advanced Android Exploits Accessing Storage, D
Lecture 91 Exploiting Android from Kali Linux using Meter 6:7
Lecture 92 Advanced Android Exploits Accessing Storage, D 8:12

Section 14 : Bonus Videos National Cyber Warrior Academy, Int

Lecture 93 Bonus videos from the National Cyber Warrior A 1:3
Lecture 94 NCWA 2016 1:14
Lecture 95 NCWA 2017 Facebook Live Video on Car Hacking a 19:54
Lecture 96 WDUN Radio Interview July 2017 on Cybersecurit 7:57