Course Description
Linux Training will offer you courses which are prepared in using Linux Administration. This bundle will provide you learning about the different programming languages which is run in Linux administration. Linux is in the simplest terms it is an Operating System. It is the software on a computer that ready the application and the computer-operator to access the devices on the computer to perform the desired functions.
The OS(Operating System) relays instructions from an a application to and for instance and the computer’s processor. Processor performs the instructed task and then it sends the results back to the application through the operating system.
In this Training Bundle you will learn about Major Concepts: 450+ lectures
Pre-requisites of Linux Course:
Benefits of online course:
1. High Quality Content
2. Learn Anywhere Anytime & at Your Pace
3. 24X7 Customer Support
4. Complete Student Support Throughout The Program
5. Online Video Training Material
6 Lifetime course access
7. Course Completion Certificate
For any Query feel free to call
Mob- +918587999769/9818826705
Curriculum
Section 1: Online UNIX & Linux Operating System Fundamentals Training
1 Basics of unix operating system
2 Unix Architecture
3 Commands and Utilities
4 Changing Password, Listing Directories
5 Logging in, Logout
6 Unix File Management
7 Listing Files
8 LS Command
9 LS-L, Metacharacters
10 Hidden Files
11 Other LS Command Variants
12 Displaying Files Recursively by LS-R Command
13 Creating Files in Unix
14 Editing Files
15 Display Contents of a File
16 Copying Files in Unix
17 Standard Unix Streams
18 Absolute/Relative Path Names
19 Removing Directories
20 Unix – File Permission / Access Modes
21 File Access Modes
22 Using chmod in Symbolic Mode
23 Use of chmod in with Absolute Permissions
24 Permissions+Environment Part 1
25 Permissions+Environment Part 2
26 Permissions+Environment Part 3
27 Permissions+Environment Part 4
28 Permissions+Environment Part 5
29 Permissions+Environment Part 6
30 Permissions+Environment Part 7
31 Permissions+Environment Part 8
32 Basic file utility+pipes and Filters Part 1
33 Basic file utility+pipes and Filters Part 2
34 Basic file utility+pipes and Filters Part 3
35 Basic file utility+pipes and Filters Part 4
36 Basic file utility+pipes and Filters Part 5
37 Basic file utility+pipes and Filters Part 6
38 Basic file utility+pipes and Filters Part 7
39 Basic file utility+pipes and Filters Part 8
40 Unix Important Commands Part 1
41 Unix Important Commands Part 2
42 Unix Important Commands Part 3
43 Unix Important Commands Part 4
44 Unix Important Commands Part 5
45 Unix Important Commands Part 6
46 Unix Important Commands Part 7
47 Unix Processes Part 1
48 Unix Processes Part 2
49 Unix Processes Part 3
50 Unix Processes Part 4
51 Unix Processes Part 5
52 Unix Processes Part 6
53 Unix Processes Part 7
54 Unix Processes Part 8
55 Unix Processes Part 9
56 Unix Processes Part 10
57 Unix Processes Part 11
58 Unix Processes Part 12
59 Unix Processes Part 13
60 Unix Processes Part 14
61 Unix Processes Part 15
62 Unix Processes Part 16
63 Unix Processes Part 17
64 Unix Processes Part 18
65 Unix Processes Part 19
66 Unix Processes Part 20
67 Unix Processes Part 21
68 Unix Processes Part 22
69 Unix Processes Part 23
70 Unix Processes Part 24
71 Unix Networking Part 1
72 Unix Networking Part 2
73 Unix Networking Part 3
74 Unix Networking Part 4
75 Unix Networking Part 5
76 Unix Networking Part 6
77 Unix Networking Part 7
78 Unix Networking Part 8
79 Unix Networking Part 9
80 Unix Networking Part 10
81 Unix Networking Part 11
82 Unix Shell Programming Part 1
83 Unix Shell Programming Part 2
84 Unix Shell Programming Part 3
85 Unix Shell Programming Part 4
86 Unix Shell Programming Part 5
87 Unix Shell Programming Part 6
88 Unix Shell Programming Part 7
89 Unix Shell Programming Part 8
90 Unix Shell Programming Part 9
91 Unix Shell Programming Part 10
92 Unix Shell Programming Part 11
93 Unix Shell Programming Part 12
94 Unix Shell Programming Part 13
95 Unix Shell Programming Part 14
96 Unix Shell Programming Part 15
97 Unix Shell Programming Part 16
98 Unix Shell Programming Part 17
99 Unix Shell Programming Part 18
100 Unix Shell Programming Part 19
101 Unix Shell Programming Part 20
102 Unix Shell Programming Part 21
103 Unix Shell Programming Part 22
104 Unix Shell Programming Part 23
105 Unix Shell Programming Part 24
106 Unix Shell Programming Part 25
107 Unix Shell Programming Part 26
108 Unix Shell Programming Part 27
109 Unix Shell Programming Part 28
110 Unix Shell Programming Part 29
111 Unix Shell Programming Part 30
112 Unix Shell Programming Part 31
113 Unix Shell Programming Part 32
114 Unix Shell Programming Part 33
115 Unix Shell Programming Part 34
116 Unix Shell Programming Part 35
117 Unix Shell Programming Part 36
118 Unix Shell Programming Part 37
119 Unix Shell Programming Part 38
120 Unix Shell Programming Part 39
121 Unix Shell Programming Part 40
122 Unix Shell Programming Part 41
123 Quoting Mechanism Part 1
124 Quoting Mechanism Part 2
125 Quoting Mechanism Part 3
126 Decision Making Part 1
127 Decision Making Part 2
128 Decision Making Part 3
129 Decision Making Part 4
130 Decision Making Part 5
131 Decision Making Part 6
132 Decision Making Part 7
133 Decision Making Part 8
134 Loop Control Part 1
135 Loop Control Part 2
136 Loop Control Part 3
137 Shell Substitution Part 1
138 Shell Substitution Part 2
139 Shell Substitution Part 3
140 Shell Substitution Part 4
141 Unix Overview Part 1
142 Unix Overview Part 2
143 Unix Overview Part 3
144 Unix Overview Part 4
145 Unix Overview Part 5
146 Unix Overview Part 6
147 Unix Overview Part 7
148 Unix Overview Part 8
149 Unix Commands Overview Part 1
150 Unix Commands Overview Part 2
151 Unix Commands Overview Part 3
152 Unix Commands Overview Part 4
153 Unix Commands Overview Part 5
154 Unix Commands Overview Part 6
155 Unix Commands Overview Part 7
156 Unix Commands Overview Part 8
157 Unix Commands Overview Part 9
158 Unix Commands Overview Part 10
159 Unix communication Commands Part 1
160 Unix communication Commands Part 2
161 Unix communication Commands Part 3
162 Unix communication Commands Part 4
163 Unix communication Commands Part 5
164 Unix communication Commands Part 6
165 Unix communication Commands Part 7
166 Vaccation Command Introduction
167 Cu Command
168 Cu Command Completed With Options
169 Tar Command
170 Compress and Uncompress Command
171 Cpio Command
172 Interprocess Communication Part 1
173 Interprocess Communication Part 2
174 Interprocess Communication Part 3
175 Interprocess Communication Part 4
176 Interprocess Communication Part 5
177 Interprocess Communication Part 6
178 The Review of Unix Commands at A Glance
179 Owner Permission Commands
180 Crontab Command
181 Df Command in Detail and Env Command
182 System Utilities
183 Shutdown and Ruptime Commands
184 Tty and Stty Command
185 Who and At Commands
186 Clear and Nohup Command
187 Bourne Shell
188 Korn Shell
189 C Shell
190 Review of Unix Important Commands
191 Shell Programming Tips
192 Before Tips of Unix Shell Programming
193 Directory Trees
194 Paths and Combination of Commands
195 Quote Variables and Escape Sequences
196 Grouping Commands in A List
197 Use of Xargs
198 Using Grep Properly
199 Match Certain Fields In Output
200 Stop Piping Cats
201 Unix Man Help
202 Unix Functions Part 1
203 Unix Functions Part 2
204 Basics of Input Output Part 1
205 Basics of Input Output Part 2
206 File Streams of Os
207 Redirections of Std In,Out and Err Part 1
208 Redirections of Std In,Out and Err Part 2
209 Unix Regular Expression Part 1
210 Unix Regular Expression Part 2
211 Unix Add Substitution
212 Unix Directory Structure Part 1
213 Unix Directory Structure Part 2
214 File Navigation Commands
215 Mounting Unmounting Part 1
216 Mounting Unmounting Part 2
217 Unix User Admin Part 1
218 Unix User Admin Part 2
219 Unix Performance Part 1
220 Unix Performance Part 2
221 Facilities
222 Logging Directories
223 Unix Signals Introduction Part 1
224 Unix Signals Introduction Part 2
225 Interrupt
226 Trap
227 Env Values Variables Part 1
228 Env Values Variables Part 2
229 Unix Files Directories Part 1
230 Unix Files Directories Part 2
231 Command
229 Unix Networking Part 1
232 Unix Networking Part 2
233 Unix Misc Commands Part 1
234 Unix Misc Commands Part 2
235 Complete Review Part 1
236 Complete Review Part 2
Section 2: Kali Linux Pentesting Training
237 Introduction Part 1
238 Introduction Part 2
239 Kali Linux
240 Operating systems_part 01
241 Operating systems_part 02
242 Installing Operating Systems
243 Installing vmware tools
244 Configuring Kali Linux
245 Installing Kali Linux on MacBook
246 What is Footprinting
247 Footprinting Objectives
248 Footprinting Tools
249 Google Hacking part 1
250 Google Hacking continued
251 Google Hacking further continued
252 WhOIS lookup
253 DNS footprinting_part 01
254 DNS footprinting_part 02
255 Determining Operation System
256 Phishing Attacks_part 01
257 Phishing Attacks_part 02
28 Connecting information database
259 Nmap and ZenMap
260 Nmap and ZenMap continued
261 Nmap and ZenMap further continued
262 The Harvester Part 1
263 The Harvester Part 2
264 WHOIS and dnsenum Part 1
265 WHOIS and dnsenum Part 2
266 Urlcrazy and dnsdict6 Part 1
267 Urlcrazy and dnsdict6 Part 2
268 Dnsrecon
269 Dnsmapping
270 Introduction
271 Types of Social Engineering
272 Social Engineering attacks
273 Spear-phishing Attack
274 Phishing Attack Part 1
275 Phishing Attack Part 2
276 Mass mailer Attack
277 Types of Computer Malwares Part 1
278 Types of Computer Malwares Part 2
279 Dangerous viruses of all time Part 1
280 Dangerous viruses of all time Part 2
281 Installing Rootkit Hunter
282 command prompt backdoor Part 1
283 Command prompt backdoor Part 2
284 Backdoor – Gaining Access
285 Backdoor – Maitaining Access Part 1
286 Backdoor – Maitaining Access Part 2
287 Command prompt backdoor continued
288 Command prompt backdoor further continued
289 Meterpreter Backdoor
290 I am Root
291 Forensic escaping
292 Hacking win7 SAM database
293 Jack the ripper
294 Meterpreter commands
295 PDF embedded Trojan Horse
296 Java Applet Attack Method_part01
297 Java Applet Attack Method_part02
298 MITM Attack
299 ARP Poisoning
300 DNS spoofing vs DNS poisoning
301 DNS spoofing
302 DNS spoofing…continued
303 DHCP Spoofing
304 Port Stealing
305 ICMP redirection
306 ICMP redirection…part 2
307 ICMP redirection…part 3
308 Killing a Network
309 Ddosing unauthorised Network
310 Driftnet
311 EvilGrade
312 EvilGrade…continued
313 Introduction to DoS
314 DoS vs DDoS
315 Levels of Ddos Attacks
316 Preventing DDoS Attacks
317 DDoSing Windows 7 method 1
318 DDoSing Windows 7 method 2
319 Hacking through Android part_1
320 Hacking through Android part_2
321 Hacking Android via Kali Linux
322 Introduction to Password Cracking
323 Password cracking Strategy
324 Password cracking Strategy..continued
325 Windows Password cracking_part 01
326 Windows Password cracking_part 02
327 Linux Hash Cracking
328 Linux Hash Cracking…continued
329 Generating wordlist
330 Generating wordlist…continued
331 CeWL cracking
332 WEP and WPA
333 WPA2
334 1X standard
335 Wireless cracking via Kali
336 Wireless cracking via Kali…continued
337 Activating payloads
338 Activating payloads…continued
339 Msfconsole explained
340 Msfconsole commands
341 Exploits
342 Payloads
343 Generating payloads
344 Generating payloads…continued
345 Intro to SQL injection
346 SQL injection to google dorks
347 SQL mapping via Kali Linux
348 Gathering Password and cracking the hash
349 Introduction_part01
350 Introduction_part02
351 Hash Func and Oracle Method
352 Birthday Theorem and Digital Signature
353 Pros and Cons of Cryptography
354 Importing Databases
355 Exporting Databases_part01
356 Exporting Databases_part02
Section 3: Linux System Administration with Python
357 Installing vmware and linuxmint
358 Introduction to Linux
359 Python Interpreter
360 Continuation of Python Interpreter
361 Python vs Bash
362 System Information script
363 Indentations and tabs
364 Functions
365 Installing vmware tools and Ipython Part 1
366 Installing vmware tools and Ipython Part 2
367 Ipython
368 Ipython vs Unix Shell
369 Directories and Bookmarks
370 Variable expansion and string processing Part 1
371 Variable expansion and string processing Part 2
372 Information gathering
373 Who functions and History
374 More history and automation
375 Built-ins and Modules-Part 1
376 Built-ins and Modules-Part 2
377 Built-ins and Modules-Part 3
378 Built-ins and Modules-Part 4
379 Regular expressions
380 Working with files
381 Writing Files
382 Standard input output
383 Automated info gathering
384 Receiving Email
385 Information Formatting Part 1
386 Information Formatting Part 2
387 PDFs- part 1
388 PDFs- part 2
389 Sockets
390 Sockets (continued)
391 Sockets (continued further)
392 SSH protocol
393 Twisted
394 Modifying directories
395 Working with directories
396 Comparing datas
397 Merging and checksums_part 01
398 Merging and checksums_part 02
399 Metadata
400 Tar archives
401 bzip2 files
402 Installing SNMP
403 Multiple Operating Systems
404 Fingerprinting
405 Cross-platform build
406 Pyinotify
407 OSX
408 Virtualization and Cloud Management
409 EPM package management
410 Subprocesses
411 Platform Module part _1
412 Platform Module part _2
413 Platform Module…continued
414 Threads
415 Threading ping sweep
416 Thread Handler
417 Thread Handler…continued
418 Processes part _1
419 Processes part _2
420 Scheduling process
421 Daemonizer part _ 2
422 Daemonizer part _1
423 Intro to GUIs
424 PyGTK App
425 Apache Log Viewer script part_1
426 Apache Log Viewer script part_2
427 Apache Log Viewer script explained
428 Pickle files
429 Pickle files…continued
430 Pickle files…continued 2
431 Pickle files…continued 3
432 YAML
433 YAML…continued
434 ZODB
435 Financial funds code
436 Serialising custom classes
437 SQlite3
438 SqlAlchemy and Storm Part 1
439 Intro to CLI
440 OptParse for simple scripts
441 True False usage pattern
442 Choices usage pattern
443 Multiple arguments usage pattern
444 Kudzu Usage Pattern
445 Hybrid Kudzu Design pattern
446 Integrating configuration files
447 Managing DNS with Python
448 Ldap
449 Apache Log parser
450 Apache Log parser…continued
451 Apache Log parser…continued 2
452 FTP mirror Script_part 01
453 FTP mirror Script_part 02
454 FTP mirror Script…continued
Here is a sample for the course completion certificate which you will receive after complete the course. This certificate is widely accepted across industries and will boost your chances to grab the job opportunities.
Mail us at: shubham.s@youth4work.com with below details to receive your certificate:
Here is a sample for the course completion certificate which you will receive after complete the course. This certificate is widely accepted across industries and will boost your chances to grab the job opportunities.
Mail us at: shubham.s@youth4work.com with below details to receive your certificate:
Curriculum
Section 1: Online UNIX & Linux Operating System Fundamentals Training
1 Basics of unix operating system
2 Unix Architecture
3 Commands and Utilities
4 Changing Password, Listing Directories
5 Logging in, Logout
6 Unix File Management
7 Listing Files
8 LS Command
9 LS-L, Metacharacters
10 Hidden Files
11 Other LS Command Variants
12 Displaying Files Recursively by LS-R Command
13 Creating Files in Unix
14 Editing Files
15 Display Contents of a File
16 Copying Files in Unix
17 Standard Unix Streams
18 Absolute/Relative Path Names
19 Removing Directories
20 Unix – File Permission / Access Modes
21 File Access Modes
22 Using chmod in Symbolic Mode
23 Use of chmod in with Absolute Permissions
24 Permissions+Environment Part 1
25 Permissions+Environment Part 2
26 Permissions+Environment Part 3
27 Permissions+Environment Part 4
28 Permissions+Environment Part 5
29 Permissions+Environment Part 6
30 Permissions+Environment Part 7
31 Permissions+Environment Part 8
32 Basic file utility+pipes and Filters Part 1
33 Basic file utility+pipes and Filters Part 2
34 Basic file utility+pipes and Filters Part 3
35 Basic file utility+pipes and Filters Part 4
36 Basic file utility+pipes and Filters Part 5
37 Basic file utility+pipes and Filters Part 6
38 Basic file utility+pipes and Filters Part 7
39 Basic file utility+pipes and Filters Part 8
40 Unix Important Commands Part 1
41 Unix Important Commands Part 2
42 Unix Important Commands Part 3
43 Unix Important Commands Part 4
44 Unix Important Commands Part 5
45 Unix Important Commands Part 6
46 Unix Important Commands Part 7
47 Unix Processes Part 1
48 Unix Processes Part 2
49 Unix Processes Part 3
50 Unix Processes Part 4
51 Unix Processes Part 5
52 Unix Processes Part 6
53 Unix Processes Part 7
54 Unix Processes Part 8
55 Unix Processes Part 9
56 Unix Processes Part 10
57 Unix Processes Part 11
58 Unix Processes Part 12
59 Unix Processes Part 13
60 Unix Processes Part 14
61 Unix Processes Part 15
62 Unix Processes Part 16
63 Unix Processes Part 17
64 Unix Processes Part 18
65 Unix Processes Part 19
66 Unix Processes Part 20
67 Unix Processes Part 21
68 Unix Processes Part 22
69 Unix Processes Part 23
70 Unix Processes Part 24
71 Unix Networking Part 1
72 Unix Networking Part 2
73 Unix Networking Part 3
74 Unix Networking Part 4
75 Unix Networking Part 5
76 Unix Networking Part 6
77 Unix Networking Part 7
78 Unix Networking Part 8
79 Unix Networking Part 9
80 Unix Networking Part 10
81 Unix Networking Part 11
82 Unix Shell Programming Part 1
83 Unix Shell Programming Part 2
84 Unix Shell Programming Part 3
85 Unix Shell Programming Part 4
86 Unix Shell Programming Part 5
87 Unix Shell Programming Part 6
88 Unix Shell Programming Part 7
89 Unix Shell Programming Part 8
90 Unix Shell Programming Part 9
91 Unix Shell Programming Part 10
92 Unix Shell Programming Part 11
93 Unix Shell Programming Part 12
94 Unix Shell Programming Part 13
95 Unix Shell Programming Part 14
96 Unix Shell Programming Part 15
97 Unix Shell Programming Part 16
98 Unix Shell Programming Part 17
99 Unix Shell Programming Part 18
100 Unix Shell Programming Part 19
101 Unix Shell Programming Part 20
102 Unix Shell Programming Part 21
103 Unix Shell Programming Part 22
104 Unix Shell Programming Part 23
105 Unix Shell Programming Part 24
106 Unix Shell Programming Part 25
107 Unix Shell Programming Part 26
108 Unix Shell Programming Part 27
109 Unix Shell Programming Part 28
110 Unix Shell Programming Part 29
111 Unix Shell Programming Part 30
112 Unix Shell Programming Part 31
113 Unix Shell Programming Part 32
114 Unix Shell Programming Part 33
115 Unix Shell Programming Part 34
116 Unix Shell Programming Part 35
117 Unix Shell Programming Part 36
118 Unix Shell Programming Part 37
119 Unix Shell Programming Part 38
120 Unix Shell Programming Part 39
121 Unix Shell Programming Part 40
122 Unix Shell Programming Part 41
123 Quoting Mechanism Part 1
124 Quoting Mechanism Part 2
125 Quoting Mechanism Part 3
126 Decision Making Part 1
127 Decision Making Part 2
128 Decision Making Part 3
129 Decision Making Part 4
130 Decision Making Part 5
131 Decision Making Part 6
132 Decision Making Part 7
133 Decision Making Part 8
134 Loop Control Part 1
135 Loop Control Part 2
136 Loop Control Part 3
137 Shell Substitution Part 1
138 Shell Substitution Part 2
139 Shell Substitution Part 3
140 Shell Substitution Part 4
141 Unix Overview Part 1
142 Unix Overview Part 2
143 Unix Overview Part 3
144 Unix Overview Part 4
145 Unix Overview Part 5
146 Unix Overview Part 6
147 Unix Overview Part 7
148 Unix Overview Part 8
149 Unix Commands Overview Part 1
150 Unix Commands Overview Part 2
151 Unix Commands Overview Part 3
152 Unix Commands Overview Part 4
153 Unix Commands Overview Part 5
154 Unix Commands Overview Part 6
155 Unix Commands Overview Part 7
156 Unix Commands Overview Part 8
157 Unix Commands Overview Part 9
158 Unix Commands Overview Part 10
159 Unix communication Commands Part 1
160 Unix communication Commands Part 2
161 Unix communication Commands Part 3
162 Unix communication Commands Part 4
163 Unix communication Commands Part 5
164 Unix communication Commands Part 6
165 Unix communication Commands Part 7
166 Vaccation Command Introduction
167 Cu Command
168 Cu Command Completed With Options
169 Tar Command
170 Compress and Uncompress Command
171 Cpio Command
172 Interprocess Communication Part 1
173 Interprocess Communication Part 2
174 Interprocess Communication Part 3
175 Interprocess Communication Part 4
176 Interprocess Communication Part 5
177 Interprocess Communication Part 6
178 The Review of Unix Commands at A Glance
179 Owner Permission Commands
180 Crontab Command
181 Df Command in Detail and Env Command
182 System Utilities
183 Shutdown and Ruptime Commands
184 Tty and Stty Command
185 Who and At Commands
186 Clear and Nohup Command
187 Bourne Shell
188 Korn Shell
189 C Shell
190 Review of Unix Important Commands
191 Shell Programming Tips
192 Before Tips of Unix Shell Programming
193 Directory Trees
194 Paths and Combination of Commands
195 Quote Variables and Escape Sequences
196 Grouping Commands in A List
197 Use of Xargs
198 Using Grep Properly
199 Match Certain Fields In Output
200 Stop Piping Cats
201 Unix Man Help
202 Unix Functions Part 1
203 Unix Functions Part 2
204 Basics of Input Output Part 1
205 Basics of Input Output Part 2
206 File Streams of Os
207 Redirections of Std In,Out and Err Part 1
208 Redirections of Std In,Out and Err Part 2
209 Unix Regular Expression Part 1
210 Unix Regular Expression Part 2
211 Unix Add Substitution
212 Unix Directory Structure Part 1
213 Unix Directory Structure Part 2
214 File Navigation Commands
215 Mounting Unmounting Part 1
216 Mounting Unmounting Part 2
217 Unix User Admin Part 1
218 Unix User Admin Part 2
219 Unix Performance Part 1
220 Unix Performance Part 2
221 Facilities
222 Logging Directories
223 Unix Signals Introduction Part 1
224 Unix Signals Introduction Part 2
225 Interrupt
226 Trap
227 Env Values Variables Part 1
228 Env Values Variables Part 2
229 Unix Files Directories Part 1
230 Unix Files Directories Part 2
231 Command
229 Unix Networking Part 1
232 Unix Networking Part 2
233 Unix Misc Commands Part 1
234 Unix Misc Commands Part 2
235 Complete Review Part 1
236 Complete Review Part 2
Section 2: Kali Linux Pentesting Training
237 Introduction Part 1
238 Introduction Part 2
239 Kali Linux
240 Operating systems_part 01
241 Operating systems_part 02
242 Installing Operating Systems
243 Installing vmware tools
244 Configuring Kali Linux
245 Installing Kali Linux on MacBook
246 What is Footprinting
247 Footprinting Objectives
248 Footprinting Tools
249 Google Hacking part 1
250 Google Hacking continued
251 Google Hacking further continued
252 WhOIS lookup
253 DNS footprinting_part 01
254 DNS footprinting_part 02
255 Determining Operation System
256 Phishing Attacks_part 01
257 Phishing Attacks_part 02
28 Connecting information database
259 Nmap and ZenMap
260 Nmap and ZenMap continued
261 Nmap and ZenMap further continued
262 The Harvester Part 1
263 The Harvester Part 2
264 WHOIS and dnsenum Part 1
265 WHOIS and dnsenum Part 2
266 Urlcrazy and dnsdict6 Part 1
267 Urlcrazy and dnsdict6 Part 2
268 Dnsrecon
269 Dnsmapping
270 Introduction
271 Types of Social Engineering
272 Social Engineering attacks
273 Spear-phishing Attack
274 Phishing Attack Part 1
275 Phishing Attack Part 2
276 Mass mailer Attack
277 Types of Computer Malwares Part 1
278 Types of Computer Malwares Part 2
279 Dangerous viruses of all time Part 1
280 Dangerous viruses of all time Part 2
281 Installing Rootkit Hunter
282 command prompt backdoor Part 1
283 Command prompt backdoor Part 2
284 Backdoor – Gaining Access
285 Backdoor – Maitaining Access Part 1
286 Backdoor – Maitaining Access Part 2
287 Command prompt backdoor continued
288 Command prompt backdoor further continued
289 Meterpreter Backdoor
290 I am Root
291 Forensic escaping
292 Hacking win7 SAM database
293 Jack the ripper
294 Meterpreter commands
295 PDF embedded Trojan Horse
296 Java Applet Attack Method_part01
297 Java Applet Attack Method_part02
298 MITM Attack
299 ARP Poisoning
300 DNS spoofing vs DNS poisoning
301 DNS spoofing
302 DNS spoofing…continued
303 DHCP Spoofing
304 Port Stealing
305 ICMP redirection
306 ICMP redirection…part 2
307 ICMP redirection…part 3
308 Killing a Network
309 Ddosing unauthorised Network
310 Driftnet
311 EvilGrade
312 EvilGrade…continued
313 Introduction to DoS
314 DoS vs DDoS
315 Levels of Ddos Attacks
316 Preventing DDoS Attacks
317 DDoSing Windows 7 method 1
318 DDoSing Windows 7 method 2
319 Hacking through Android part_1
320 Hacking through Android part_2
321 Hacking Android via Kali Linux
322 Introduction to Password Cracking
323 Password cracking Strategy
324 Password cracking Strategy..continued
325 Windows Password cracking_part 01
326 Windows Password cracking_part 02
327 Linux Hash Cracking
328 Linux Hash Cracking…continued
329 Generating wordlist
330 Generating wordlist…continued
331 CeWL cracking
332 WEP and WPA
333 WPA2
334 1X standard
335 Wireless cracking via Kali
336 Wireless cracking via Kali…continued
337 Activating payloads
338 Activating payloads…continued
339 Msfconsole explained
340 Msfconsole commands
341 Exploits
342 Payloads
343 Generating payloads
344 Generating payloads…continued
345 Intro to SQL injection
346 SQL injection to google dorks
347 SQL mapping via Kali Linux
348 Gathering Password and cracking the hash
349 Introduction_part01
350 Introduction_part02
351 Hash Func and Oracle Method
352 Birthday Theorem and Digital Signature
353 Pros and Cons of Cryptography
354 Importing Databases
355 Exporting Databases_part01
356 Exporting Databases_part02
Section 3: Linux System Administration with Python
357 Installing vmware and linuxmint
358 Introduction to Linux
359 Python Interpreter
360 Continuation of Python Interpreter
361 Python vs Bash
362 System Information script
363 Indentations and tabs
364 Functions
365 Installing vmware tools and Ipython Part 1
366 Installing vmware tools and Ipython Part 2
367 Ipython
368 Ipython vs Unix Shell
369 Directories and Bookmarks
370 Variable expansion and string processing Part 1
371 Variable expansion and string processing Part 2
372 Information gathering
373 Who functions and History
374 More history and automation
375 Built-ins and Modules-Part 1
376 Built-ins and Modules-Part 2
377 Built-ins and Modules-Part 3
378 Built-ins and Modules-Part 4
379 Regular expressions
380 Working with files
381 Writing Files
382 Standard input output
383 Automated info gathering
384 Receiving Email
385 Information Formatting Part 1
386 Information Formatting Part 2
387 PDFs- part 1
388 PDFs- part 2
389 Sockets
390 Sockets (continued)
391 Sockets (continued further)
392 SSH protocol
393 Twisted
394 Modifying directories
395 Working with directories
396 Comparing datas
397 Merging and checksums_part 01
398 Merging and checksums_part 02
399 Metadata
400 Tar archives
401 bzip2 files
402 Installing SNMP
403 Multiple Operating Systems
404 Fingerprinting
405 Cross-platform build
406 Pyinotify
407 OSX
408 Virtualization and Cloud Management
409 EPM package management
410 Subprocesses
411 Platform Module part _1
412 Platform Module part _2
413 Platform Module…continued
414 Threads
415 Threading ping sweep
416 Thread Handler
417 Thread Handler…continued
418 Processes part _1
419 Processes part _2
420 Scheduling process
421 Daemonizer part _ 2
422 Daemonizer part _1
423 Intro to GUIs
424 PyGTK App
425 Apache Log Viewer script part_1
426 Apache Log Viewer script part_2
427 Apache Log Viewer script explained
428 Pickle files
429 Pickle files…continued
430 Pickle files…continued 2
431 Pickle files…continued 3
432 YAML
433 YAML…continued
434 ZODB
435 Financial funds code
436 Serialising custom classes
437 SQlite3
438 SqlAlchemy and Storm Part 1
439 Intro to CLI
440 OptParse for simple scripts
441 True False usage pattern
442 Choices usage pattern
443 Multiple arguments usage pattern
444 Kudzu Usage Pattern
445 Hybrid Kudzu Design pattern
446 Integrating configuration files
447 Managing DNS with Python
448 Ldap
449 Apache Log parser
450 Apache Log parser…continued
451 Apache Log parser…continued 2
452 FTP mirror Script_part 01
453 FTP mirror Script_part 02
454 FTP mirror Script…continued