Hands-On Cybersecurity and Ethical Hacking – Full Course
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.

收录于
学科与领域
年级范围
页面类型
关键词
简介
Master the fundamentals of Cybersecurity and Ethical Hacking with this beginner-friendly, hands-on course using Kali Linux. You’ll learn to identify, exploit, and defend against real-world vulnerabilities while building a solid foundation in penetration testing, network security, and vulnerability assessment. By mastering professional tools like Nmap and Wireshark, you will develop the practical skills and mindset needed to secure systems and think like an ethical hacker.
Course from @SunnyDimalu
🎓 Full Cybersecurity Course: https://www.udemy.com/course/hands-on-cyber-security-and-ethical-hacking-from-0/?referralCode=215B6E0F86B92F10EDA4
Chapters
– 0:00:00 Introduction
– 0:02:03 What is Kali Linux
– 0:03:22 Basic Commands & Terminal Customization
– 0:07:04 ls Command
– 0:12:30 cd Command
– 0:15:19 Nano Editor
– 0:20:14 cat Command
– 0:23:50 Create Files Using cat
– 0:28:56 Create Directories
– 0:31:11 grep Command
– 0:36:54 wc Command
– 0:39:15 Output Redirection
– 0:45:43 Piping
– 0:52:21 Copy Files
– 0:58:51 Remove Files & Directories
– 1:05:40 Types of Users
– 1:13:45 Root User
– 1:15:06 sudo Command (Administrative Tasks)
– 1:25:17 ip addr Command
– 1:29:32 Install Packages
– 1:33:35 Remove Packages
– 1:35:57 Introduction to Nmap
– 1:37:02 Scan Ports
– 1:43:38 Wi-Fi Security: System Requirements & Wireless Card
– 1:49:30 Introduction to Aircrack-ng
– 1:51:15 Monitor Mode vs Managed Mode
– 1:53:17 Enable Monitor Mode
– 1:58:23 Scan Wi-Fi Networks & Capture Traffic
– 2:08:36 Scan 5GHz Wi-Fi Networks (Theory)
– 2:11:08 Scan 5GHz Wi-Fi Networks (Practical)
– 2:15:36 What is a 4-Way Handshake
– 2:20:02 Capture a 4-Way Handshake
– 2:27:57 What is a De-authentication Attack
– 2:30:55 Capture 4-Way Handshake Using De-authentication Attack
– 2:39:40 Wordlists & Dictionary Attacks
– 2:45:40 Crack / Recover Wi-Fi Password
– 2:53:25 Detect De-authentication Attacks /Threats
– 3:01:27 Wireshark Tutorial
❤️ Support for this channel comes from our friends at Scrimba – the coding platform that's reinvented interactive learning: https://scrimba.com/freecodecamp
🎉 Thanks to our Champion and Sponsor supporters:
👾 @omerhattapoglu1158
👾 @goddardtan
👾 @akihayashi6629
👾 @kikilogsin
👾 @anthonycampbell2148
👾 @tobymiller7790
👾 @rajibdassharma497
👾 @CloudVirtualizationEnthusiast
👾 @adilsoncarlosvianacarlos
👾 @martinmacchia1564
👾 @ulisesmoralez4160
👾 @Oscar
👾 @jedi-or-sith2728
👾 @justinhual1290
--
Learn to code for free and get a developer job: https://www.freecodecamp.org
Read hundreds of articles on programming: https://freecodecamp.org/news
用户评价
暂无已发布的评价,欢迎率先分享您的使用体验。