FILENAME | SIZE |  | 01.Welcome/0101.The Course Overview.mp4 | 13.4 MB |
 | 01.Welcome/0102.How to Get the Most Out of This Course.mp4 | 12.1 MB |
 | 01.Welcome/0103.Teaser Hack Updated Windows10 Using Kali Linux.mp4 | 46.4 MB |
 | 01.Welcome/0104.Kali Linux Basics.mp4 | 27.4 MB |
 | 02.Lab Setup/0201.Download and Install VMware Workstation.mp4 | 13.6 MB |
 | 02.Lab Setup/0202.Download Windows and Kali Linux.mp4 | 38 MB |
 | 02.Lab Setup/0203.Installation of Windows and Kali Linux.mp4 | 13.8 MB |
 | 02.Lab Setup/0204.Update the Kali Linux Operating System.mp4 | 25.1 MB |
 | 03.Terminal Commands/0301.File Commands.mp4 | 18.9 MB |
 | 03.Terminal Commands/0302.Directory Commands.mp4 | 24 MB |
 | 03.Terminal Commands/0303.Chain Commands.mp4 | 24.1 MB |
 | 03.Terminal Commands/0304.Manage Services.mp4 | 13.5 MB |
 | 04.Information Gathering/0401.Using the NetDiscover Tool.mp4 | 22.4 MB |
 | 04.Information Gathering/0402.Using the Nmap Tool.mp4 | 29.1 MB |
 | 04.Information Gathering/0403.Using the Sparta Tool.mp4 | 15 MB |
 | 04.Information Gathering/0404.Using the Maltego Tool.mp4 | 41.2 MB |
 | 04.Information Gathering/0405.Using the Recon-NG Tool.mp4 | 33.8 MB |
 | 05.Vulnerability Analysis/0501.Using the Burp Suite Tool.mp4 | 42.8 MB |
 | 05.Vulnerability Analysis/0502.Using the ZAP Tool.mp4 | 37.2 MB |
 | 05.Vulnerability Analysis/0503.WordPress Scanning Using WPScan.mp4 | 65.7 MB |
 | 05.Vulnerability Analysis/0504.Nessus Installation.mp4 | 29.7 MB |
 | 05.Vulnerability Analysis/0505.Vulnerability Analysis Using Nessus.mp4 | 41.3 MB |
 | 05.Vulnerability Analysis/0506.Analyze the Web Using HTTrack.mp4 | 33.5 MB |
 | 06.Database Hacking/0601.Using the SQLite Tool.mp4 | 37.9 MB |
 | 06.Database Hacking/0602.Using the Sqlmap Tool.mp4 | 48.4 MB |
 | 06.Database Hacking/0603.Using the JSQL Tool.mp4 | 35 MB |
 | 06.Database Hacking/0604.Using SQLsus.mp4 | 35.8 MB |
 | 07.Password Cracking/0701.Using Crunch Commands.mp4 | 27.8 MB |
 | 07.Password Cracking/0702.Using John the Ripper Tool.mp4 | 24.5 MB |
 | 07.Password Cracking/0703.FTP Setup.mp4 | 36.6 MB |
 | 07.Password Cracking/0704.Using Hydra.mp4 | 45 MB |
 | 07.Password Cracking/0705.Using Medusa.mp4 | 42.3 MB |
 | 07.Password Cracking/0706.Using Ncrack.mp4 | 17.2 MB |
 | 08.Man-in-the-Middle AttackSniffing/0801.Using the MAC Changer Tool.mp4 | 26.5 MB |
 | 08.Man-in-the-Middle AttackSniffing/0802.Using the Wireshark Tool.mp4 | 38.3 MB |
 | 08.Man-in-the-Middle AttackSniffing/0803.Using the Ettercap Tool.mp4 | 31.2 MB |
 | 08.Man-in-the-Middle AttackSniffing/0804.Using MITMProxy and Driftnet Tool.mp4 | 20.2 MB |
 | 09.Social Engineering Attack/0901.Phishing Attack Using SET.mp4 | 36 MB |
 | 09.Social Engineering Attack/0902.Trojan Attack Using SET.mp4 | 42.9 MB |
 | 09.Social Engineering Attack/0903.Using the Maltego Tool.mp4 | 32.2 MB |
 | 09.Social Engineering Attack/0904.Using Browser Exploitation Framework.mp4 | 29.3 MB |
 | 10.Wireless Hacking/1001.About Wireless Adapter.mp4 | 15.7 MB |
 | 10.Wireless Hacking/1002.Start Monitor Mode.mp4 | 21.9 MB |
 | 10.Wireless Hacking/1003.Hack WEP Using the Fern Tool.mp4 | 34.2 MB |
 | 10.Wireless Hacking/1004.Create a Dictionary.mp4 | 14.5 MB |
 | 10.Wireless Hacking/1005.Hack WPAWPA2WPA2-PSK.mp4 | 23.2 MB |
 | 11.Exploitation Techniques/1101.Metasploit Basics.mp4 | 34.3 MB |
 | 11.Exploitation Techniques/1102.AV Bypass Frameworks.mp4 | 25.3 MB |
 | 11.Exploitation Techniques/1103.Bypass Target Defender.mp4 | 28.5 MB |
 | 11.Exploitation Techniques/1104.Bypass Target Antivirus.mp4 | 33.1 MB |
 | 12.Post-Exploitation Techniques/1201.Meterpreter Commands.mp4 | 47.2 MB |
 | 12.Post-Exploitation Techniques/1202.Insert Keylogger.mp4 | 14.7 MB |
 | 12.Post-Exploitation Techniques/1203.Privilege Escalation.mp4 | 22.6 MB |
 | 12.Post-Exploitation Techniques/1204.Stealing Login Credentials.mp4 | 24.5 MB |
 | 13.Reporting/1301.Using Leafpad.mp4 | 11 MB |
 | 13.Reporting/1302.Using CutyCapt.mp4 | 21.6 MB |
 | 13.Reporting/1303.Using Faraday IDE.mp4 | 17 MB |
 | 13.Reporting/1304.Using recordMyDesktop.mp4 | 20.5 MB |