Setup Menus in Admin Panel

  • LOGIN
  • No products in the cart.

Course Name: The Complete Ethical Hacking Course 2.0 Python & Kali Linux

Descriptions

Course Curriculum

Section 1: Introduction
Welcome! 00:00:00
Introduction 00:00:00
Why Program 00:00:00
Section 2: The Basics of Python
Downloading Python 00:00:00
Python Interpreter and Idle 00:00:00
Nuts And Bolts Of A Sample Program 00:00:00
Section 3: Basic Python Programming
Python Strings 00:00:00
Getting Input 00:00:00
Reading And Writing Files – Part 1 00:00:00
Reading And Writing Files – Part 2 00:00:00
Python Expressions 00:00:00
Section 4: Functions in Python Programming
Creating Your First Program – Part 1 00:00:00
Creating Your First Program – Part 2 00:00:00
Placing Comments In Code 00:00:00
Introduction To Strings – Part 1 00:00:00
Introduction To Strings – Part 2 00:00:00
What Are Functions 00:00:00
Print Function 00:00:00
Escape Codes 00:00:00
Input Function 00:00:00
Section 5: Python Variables and Lists
Global Variables 00:00:00
Concept Of Dictionaries 00:00:00
Concepts Of Lists 00:00:00
What Are Tuples 00:00:00
Section 6: Python Conditionals
Introduction To Loops – Part 1 00:00:00
Introduction To Loops – Part 2 00:00:00
Working With Graphics 00:00:00
Conditional Execution 00:00:00
IF Statement 00:00:00
Additional IF Statements 00:00:00
The While Loop 00:00:00
Section 7: Projects
Project A 00:00:00
Project B 00:00:00
Conclusion 00:00:00
Section 8: ETHICAL HACKING - Inroduction
ETHICAL HACKING – Course Introduction 00:00:00
Section 9: Penetration Testing
What is Penetration Testing 00:00:00
Five Phases of Penetration Testing 00:00:00
Section 10: Downloading and Installing Important Softwares
Building a Web Server 00:00:00
Installing Virtual Box 00:00:00
Downloading and Installing Kali Linux 00:00:00
Downloading Python Kali Linux 00:00:00
Installing Wing IDE Editor 00:00:00
Section 11: Python and Kali Linux
First Penetration Program Using Python 00:00:00
TCP Client in Python 00:00:00
TCP Service in Python 00:00:00
Raw Binary Packets 00:00:00
Port Scanning Using NMAP 00:00:00
Section 12: SQL Mapping
Sniffing – Part 1 00:00:00
Sniffing – Part 2 00:00:00
SQL Injection – Part 1 00:00:00
SQL Injection – Part 2 00:00:00
SQL Injection – Part 3 00:00:00
SQL Injection – Part 4 00:00:00
Brute Force – Part 1 00:00:00
Brute Force – Part 2 00:00:00
Section 13: Python Practice Tasks
Strings Tasks 00:00:00
Count The Number Tasks 00:00:00
Sum Numbers Task 00:00:00
Sum Integers Task 00:00:00
Copyright Information Task 00:00:00
Counting Characters Task 00:00:00
Calculate Years Task 00:00:00
Section 14: Course Wrap Up
Course Conclusion 00:00:00
Section 15: Extra Resources - BONUS
SQL Injection – Attacks and Defenses 00:00:00
Online Learning Thailand.
X