Introduction
Black, White and Gray Hat Hackers
Navigating the Usability Triangle
Red, Blue, and Purple Teams
Ethical Hacking Phases
Introduction to Ethical Hacking Phases
From Reconnaissance to Covering Tracks
Simulating the Penetration Testing Role - Knowledge Check
War Driving, Flying and Walking
Recon-ng - Tool Introduction
Ready, Set, Lab! - Working with Recon-ng
Ready, Set, Lab! - Nmap Port Scanning
Password Cracking Techniques
Hydra - Tool Introduction
Ready, Set, Lab! - RDP Brute Force Attack
Introduction to The Cyber Kill Chain
"How Can Cyber Kill Chain Protect Against Attacks?
Your Career Guide to Success
Grow Your Professional Network & Achieve Your Career Goals
Week 15 - Weekly Quiz (Master)
10Questions