Course Outlines

Explore the comprehensive syllabus designed to make you a cybersecurity expert. Follow the updated modules below.

1 Introduction To Ethical Hacking & Overview

  • Offensive And Defensive Security

2 Hacking Environment Setup: Kali Linux & Linux Mastery

  • How To Install Kali Linux On Your Computer
  • Master Linux From Basic To Advanced

3 Web Application Testing Fundamentals

  • Burpsuite For Web Application Pentesting
  • Master BurpSuite Professional In One Lecture

4 File Path Traversal Vulnerabilities

  • File path traversal, simple case
  • File path traversal, traversal sequences blocked with absolute path bypass
  • File path traversal, traversal sequences stripped non-recursively
  • Automation of File path traversal vulnerabilities

5 Information Disclosure Vulnerabilities

  • Information Leakage Vulnerabilities
  • Information Leakage In Error Messages
  • Information Leakage On Debug Page
  • Source Code Disclosure Via Backup Files
  • Automating Information Disclosure Discovery: Feroxbuster, FFUF, Dirbuster & Dirb Step by Step

6 Automated Information Disclosure Techniques

  • Automate The Process Of Finding Information Disclosure Vulnerabilities

7 OS Command Injection

  • Introduction To OS Command Injection
  • OS Command Injection Simple Case
  • Blind OS Command Injection With Time Delays
  • Blind OS Command Injection With Output Redirection

8 SSRF Vulnerabilities

  • Introduction To SSRF Vulnerability
  • Basic SSRF Against The Local Server
  • SSRF Against Blacklist-Based Input Filter
  • Basic SSRF Against Another Back-End System

9 File Upload Vulnerabilities & Remote Code Execution

  • Introduction To File Upload Vulnerabilities
  • Remote Code Execution Via Web Shell Upload
  • Web Shell Upload Via Content-Type Restriction Bypass
  • Web Shell Upload Via Path Traversal
  • Remote Code Execution Via Polyglot Web Shell Upload
  • Web Shell Upload Via Obfuscated File Extension

10 Access Control Vulnerabilities

  • Introduction To Access Control Vulnerabilities
  • Unprotected Admin Functionality
  • Unprotected Admin Functionality With Unpredictable URL
  • User Role Controlled By Request Parameter
  • User Role Can Be Modified In User Profile
  • Insecure Direct Object References
  • User ID Controlled By Request Parameter With Password Disclosure

11 Business Logic Vulnerabilities

  • Introduction To Business Logic Vulnerabilities
  • Excessive Trust In Client-Side Controls
  • High-Level Logic Vulnerability
  • Inconsistent Security Controls
  • Flawed Enforcement Of Business Rules
  • Weak Isolation On Dual-Use Endpoint
  • Insufficient Workflow Validation

12 Cross-Site Scripting (XSS)

  • Introduction To XSS-Cross Site Scripting
  • Reflected XSS
  • Stored XSS
  • DOM XSS
  • DOM XSS- Part 2

13 SQL Injection Fundamentals

  • SQL Programming
  • Introduction To SQL Injection Vulnerability
  • SQL Injection Vulnerability Allowing Login Bypass

14 Advanced SQL Injection Techniques

  • SQL Injection UNION Attack, Determining Number Of Columns
  • SQL Injection UNION Attack, Finding A Column Containing Text
  • SQL Injection UNION Attack, Retrieving Data From Other Tables
  • SQL Injection UNION Attack, Retrieving Multiple Values
  • SQL Injection Attack, Listing Database Contents On Non-Oracle Databases
  • Blind SQL Injection With Time Delays
  • Mastering SQLmap Step by Step

15 Automation In Cybersecurity

  • Introduction To Automation (The Core Of Cybersecurity)

16 Subdomain Enumeration & Reconnaissance Tools

  • Installation Of Subfinder - Subdomain Enumeration
  • Installation Of Assetfinder - Subdomain Enumeration
  • Configure And Install Findomain - Subdomain Enumeration

17 URL & HTTP Reconnaissance Tools

  • How To Install Waymore URLs
  • Configure And Install HTTPX Tool

18 Exploitation Tools - Part 1

  • Install Katana Tool
  • How To Install Nuclei Framework - Exploitation
  • How To Install And Configure Nuclei Templates

19 Exploitation Tools - Part 2

  • Install Parallel, Qsreplace Tools

20 Web Security Automation - Integration

  • Putting It All Together - Web Security Automation Part: 1
  • Web Security Automation Part: 2

21 Web Security Automation - Exploitation Phase

  • Exploitation Phase - Web Security Automation Part: 3

22 Advanced Automation & Final Chapter

  • The Final Chapter; Automate Everything

23 XML Injection & XXE Attacks

  • Introduction To XML Injection Attacks
  • Exploiting XXE Using External Entities To Retrieve Files
  • Exploiting XXE To Perform SSRF Attacks
  • Blind XXE With Out-Of-Band Interaction

24 Authentication Vulnerabilities & User Enumeration

  • Introduction To Authentication Vulnerabilities
  • Username Enumeration Via Subtly Different Responses
  • 2FA Simple Bypass
  • Password Reset Broken Logic
  • Username Enumeration Via Subtly Different Responses

25 Reconnaissance & Vulnerability Assessment

  • The Art Of Hacking- Reconnaissance
  • NetSec Challange- Reconnaissance Part 2
  • Practical Vulnerabilities Exploitation
  • Penetration Testing Vulnerabilities 101

26 Metasploit & Exploitation Frameworks

  • Mastering Metasploit Framwork Part 1
  • Hack Windows Machine Using Metasploit

27 Linux Privilege Escalation

  • Sensitive Credentials Hunting
  • Weak File Permissions
  • Cron Jobs
  • SUID Wildcard
  • SUDO - Shell Escape Sequences
  • SUDO Exploitation ld_preload
  • SUDO LD_LIBRARY_PATH
  • SUID Exploitation - Known Vulnerabilities (CVEs)
  • SUID Shared Object Injection
  • Linux Capabilities
  • Service Exploitation: MySQL (Boot to Root)
  • Network File System (NFS)
  • Revision of LinuxPrivEsc

28 Practical Hacking into Linux Machines (Projects)

  • Mr.Robot CTF Linux
  • TryHackMe CTF: Vulnversity - Walkthrough Linux
  • Skynet Walkthrough Linux
  • DailyBugle TryHackMe Walkthrough Linux
  • Game Zone Linux
  • Kenobi Linux

29 Windows Privilege Architecture & Escalation

  • User Account Control (UAC)
  • Login to RDP and Dropping Files + Receiving
  • Windows PrivEsc (Overview)
  • Windows Services
  • Service Abuse: Weak Service Executable
  • Service Abuse: Weak Service Permission
  • Service Abuse: Unquoted Service Paths
  • Service Abuse: DLL Hijacking Intro
  • Service Abuse: DLL Hijacking Practical
  • Sensitive Credentials Hunting Theory
  • Sensitive Credentials Hunting
  • Part 1: SAM (Security Account Manager)
  • Part 2: SAM (Security Account Manager)
  • Introduction to Windows Registry
  • Lab: Registry Autorun Exploitation
  • Lab: Weak Registry Permissions
  • AlwaysInstallElevated
  • Theory - Impersonation Attacks
  • [LAB] SeImpersonate Exploit: JuicyPotato
  • Lab: PrintSpoofer (The King of Token Impersonation)
  • [LAB] RoguePotato (Token Impersonation)
  • Universal Methodology: SeTakeOwnership Exploit
  • Startup Apps Exploitation
  • Insecure GUI Apps
  • seBackupExploit
  • Kernel Exploit Windows 7
  • Windows 10 Kernel Exploitation
  • Attack Vector: Scheduled Task Resource Abuse
  • UAC (User Account Control) Bypass

30 Practical Hacking into Windows Machines (Projects)

  • Steel Mountain | WIN
  • Alfred Walkthrough WIN
  • HackPark TryHackMe WIN
  • Relevant (TryHackMe) WIN
  • Internal (TryHackMe) WIN
  • Retro TryHackMe Walkthrough WIN

31 Advanced / Miscellaneous Topics

  • Master Metasploit Overview
  • Port Forwarding, Tunneling and Pivoting
  • Port Forwarding, Tunneling and Pivoting in WINDOWS

32 Bash Scripting - Advanced Module

  • Introduction to Bash Scripting
  • Variables, Loops and Conditions
  • Functions and Automation Scripting
  • Writing Custom Recon Tools in Bash

33 Python for Hackers

  • Introduction to Python Programming
  • Network Programming (Sockets & Requests)
  • Building Custom Exploits in Python
  • Automating Tools with Python

34 AI in Red Teaming & Bug Bounty

  • How to use AI to Hack Machines
  • Using AI for Red Teaming and Pentesting
  • Automating Bug Bounty Workflows with AI
  • Creating Custom Exploits and Analysis using LLMs