-
SECTION 1 : Introduction 6
-
Lecture1.1
-
Lecture1.2
-
Lecture1.3
-
Lecture1.4
-
Lecture1.5
-
Lecture1.6
-
-
SECTION 2 : Kali Linux 4
-
Lecture2.1
-
Lecture2.2
-
Lecture2.3
-
Lecture2.4
-
-
SECTION 3 : Tools and software 3
-
Lecture3.1
-
Lecture3.2
-
Lecture3.3
-
-
SECTION 4 : Networking 9
-
Lecture4.1
-
Lecture4.2
-
Lecture4.3
-
Lecture4.4
-
Lecture4.5
-
Lecture4.6
-
Lecture4.7
-
Lecture4.8
-
Lecture4.9
-
-
SECTION 5 : Ethical Hacking Hands-on 5
-
Lecture5.1
-
Lecture5.2
-
Lecture5.3
-
Lecture5.4
-
Lecture5.5
-
-
SECTION 6 : Phishing 9
-
Lecture6.1
-
Lecture6.2
-
Lecture6.3
-
Lecture6.4
-
Lecture6.5
-
Lecture6.6
-
Lecture6.7
-
Lecture6.8
-
Lecture6.9
-
-
SECTION 7 : Assignment 2
For practice
-
Lecture7.1
-
Lecture7.2
-
-
SECTION 8 : Assessment 1
For practice
-
Quiz8.1
-
-
SECTION 8 : Feedback 1
-
Lecture9.1
-
This content is protected, please login and enroll course to view this content!
Prev
Phishing – SEToolkit
Next
Assignment (B)