
Introduction

Hacking lab setup

kali linux

Anonymity online

Dark Web

Network pentesting

Gathering information from network

Wireless attack

Post connection attack

System pentesting

Attack on user

Social engineering

Social media security

Beef

External network attacks

Fake game website attack introduction

Post hacking session

Hacker methodology

Website reconnaissance

Website pentesting

Cross site scripting

SQL

SQL injection

Website pentesting tool

Ethical hacking certificate

Python for ethical hacking setup

Python data types & structure introduction

Essential

Function

Object oriented programming

Module

MAC Changer

Network scanner

Man in the middle

Packet listener

Keylogger

Backdoor

Packaging and malicious file

Closing & ethical hacking handbook
Link: