arrow_back
Module 1: Introduction
Class 1: Introduction
Class 2: Fundamentals of Cyber Security, Ethical Hacking, Linux, and Digital Forensics
Module 2 : Setting up Labs , Network Concepts and Linux Basic Commands with File System
Class 3: Pre built Kali Linux Version 2025.1c Virtual Machines Installation
Kali linux-2025.1c-Virtualbox Resource File Download Details
Class 4: Kali Linux ISO File Installation, Network Concept and Linux Commands & Files
Kali Linux 2023.3 ISO File Download Link Details
VirtualBox-7.1.10-169112-Win Download File
Module 3 : Linux Essentials and Networking theory with Practical
Lecture 5: Linux Basics: Essential Command-line skills to navigate and manage.
Lecture 6: Linux, Internet Protocol and Networking Port Usage
Lecture 7: Local Area Network (LAN) Practical
Lecture 8: XAMPP Installation Guide: Set up a Local Server Environment.
Xampp Software File
Module 4 : Advanced Topics on Linux and Networking
Lecture 9: Linux Permissions: Chmod, User and group Management Hands on Practical
Lecture 10: VPN & Proxy in Networking: Concepts, Usage and Implementation for Security
Lecture 11: VPN and Proxy Setup: Practical Demonstration and Configuration
Lecture 12: Proxy Free Tools OSI and TCP/IP Model, TCP Handshake & Session Termination etc.
Proxy Free Tools for Kali Linux
Module 5 : Digital Forensics
Lecture 13: Digital Forensics: Theory & Bit-by-Bit Copy with hands-on Demonstration
AccessData FTK Imager_3.1.4 Software File
Module 6 : Ethical Hacking Fundamentals (Theory + Practical)
Lecture 14: DNS & Zone Files, Ethical Hacking Process, Footprinting & Reconnaissance
Lecture 15: Hands On: Netcraft, Wappalyzer, and Website Investigation Techniques
Lecture 16: Footprinting, Kali Linux, Buffer size, SSL & Wayback Machine
Lecture 17: SPF, Email Investigation , IP lookup, Footprinting Advance Tool Usage Practical
Kali Linux Tool Details
Email Investigation Tools
Module 7 : Digital Forensics & Memory Analysis
Lecture 18: Theory of Computer, Memory forensics, RAM Data Analysis, FTK Imager, OS Forensic
VolatilityWorkbench
AccessData FTK Imager_3.1.4 Software File
OSForensics Software File
Lecture 19: Disk Imaging: Copy and Bit-by-Bit Copy Detail Concepts
Lecture 20: Write blocker, Bit by Bit Copy using FTK Imager , Data Export and OS Forensics
Module 8 : Penetration Testing Environment , Network Scanning and OS Forensics
Lecture 21: Metasploitable Server and Penetration Testing Machine Setup, Network Scanning
Metasploitable Server Download Link Details
Lecture 22: Windows XP in VirtualBox, Network Scanning, Reports Generation and Analysis
Windows XP and Product Key
Lecture 23: Advanced Network Scanning, Enumeration Types and NetBIOS demonstration
Lecture 24: NMAP and Enumeration Practical, OS Forensics Hands On
Module 9 : Cyber Crime Investigation , Digital Forensics and Vulnerability Analysis
Lecture 25: OS Forensics, Cyber Crime Case Study , IPDR, SDR, CDR, IP Dump and Steganography
OSForensics Software File
Lecture 26: Steganography Tools, Hash Values, Drive Hash Value and Website Investigation
Download Steganography Tool
Lecture 27: Case Investigation, IP Capture Tools and Vulnerability Analysis Concepts
Lecture 28: Advanced Vulnerability Analysis: Deeper Insights and Case Studies
Lecture 29: Vulnerability Scanning and Analysis Using Zaproxy
Lecture 30: Vulnerability Scanning, Analysis and Report Generation using Nessus
Tenable Nessus Download Details
Module 10 : Revision and Social Engineering
Lecture 31: Nessus and zaproxy revision, Zenmap & Social Engineering Overview
Lecture 32: Social Engineering: Types, Techniques and Psychological Tactics.
Lecture 33: Hands-On: Social Engineering with Free Tools
Social Engineering Free Tool Download Page
Lecture 34: Social Engineering (Local & Remote), keylogger and Wireshark
Social Engineering Own Tools
Wireshark 4.4.7-x64 Software File
Lecture 35: Check Internet/Broadband Connection Stability and Performance
Module 11 : Case Investigation , Attacks & Defence
Lecture 36: Sextortion Case Investigation, Packet Capture, DoS/DDoS, SQL & SQL Injection
SQL_Injection
Lecture 37: Advanced SQL injection Using Burp Suite and Google Dork Demonstration
SQL_Injection
Lecture 38: Browser, Image and Anti-Forensics Using Open Source & Premium tools
Exif Tools
Browser Forensics Tools Details
Lecture 39: Sniffing: Active vs Passive, MAC spoofing & Flooding Techniques
Lecture 40: Advanced MAC Flooding, DHCP Flooding, Wireshark Practical
Wireshark 4.4.7-x64 Download Tool
Module 12 : Malware Threats
Lecture 41: Revision of DHCP , Malware Threats, Worms, Static and Dynamic Malware Analysis
Lecture 42: Remote Payload Malware Demonstration with Practical Setup
Malware Threats Software Files
Module 13 : System Hacking & Cryptography
Lecture 43: System Hacking, Log Clearing, Cryptography Concepts & Practical
Log Clear Tool
Lecture 44: Web Server Attacks
Lecture 45: Vulnerability Assessment using Acunetix
Web Vulnerability Scanner Tools with Downloadable Installation Guide Tutorials
Lecture 46: Fun with Hacking
Module 14 : Social Media Investigation
Lecture 47: Investigating Social Media Crimes
Lecture 48: Real Case Investigation
Module 15 : Android Penetration, Google Dork & Dark Web
Lecture 49: Android App Pen Testing & Investigation
MobSF Details
Lecture 50: Clearing Tracks in Ethical Hacking
Log Clear Software
Lecture 51: Google Dork
Google Dork Notes
Lecture 52: Dark Web Concept
Lecture 53: Dark Web Practical, Tails OS installation and Usage Demonstration
Tails Download Page Details
Lecture 54: Session Hijacking
Lecture 55: Bypass OTP: Concept with Demonstration
Module 16 : Shell and Bug Reporting
Lecture 56: Shell Scripting and Bug Reporting
Module 17 : Dump File Analysis using Kali Tools
Lecture 57: Bulk Extractor
Lecture 58: Foremost
Module 18 : Data Recovery
Lecture 59: Data recovery with Premium Software
Data Recovery Tool
Module 19 : Digital Forensics with Hardware
Lecture 60: Write Blocker: Introduction
Lecture 61: Hardware write Blocker: Demonstration and usage in Forensics System
Module 20 : Wi Fi Hacking Hardware Device Making
Lecture 62: Wi-Fi Deauther Device Making and Demonstration Step by Step
WiFi Deauther Device Making Source Code
Lecture 63: Wi-Fi Password Hacking Device Making and Demonstration Step by Step
Wi-Fi Password Hacking IoT Device Making Application with Source Code
Module 21 : Conclusion
Lecture 64: Conclusion Tutorials
Digital Forensics Tools
Preview - Mastering Cyber Security: Ethical Hacking, Digital Forensic & Cyber Crime Investigation
Discuss (
0
)
navigate_before
Previous
Next
navigate_next