Basics of footprinting
Methods of footprinting
Google Dorks
Metagoofil
Maltego
Introduction to Scanning
Scanning Methodology
IP Grabber (Grabify)
Whois
Scanning Wordpress site
Nmap
Nmap Advance
Netcat
Netdiscover
Dirb
How to use netcraft
How to use robtex
Collecting subdomain(knockpy)
Using whatweb in kali
Basics of Enumeration
Understanding Enumeration
SNMP Enumeration
DNS Enumeration (Dig command)
NetBios Enumeration (Zenmap)
Burpsuite
How to Exploit SQL Database? (Havij)
Performing MITM attack over WiFi
MITM and DOS attack (HPing)
Exploiting SSH in any Web Server
Wireshark
TCPdump
How to change MAC address of your computer
Security features and authentications
VAPT
Web Application Login Bypass (SQL Injection)
SQLmap in Kali
Cross Site Scripting (XSS)
Exploiting XSS with BeEF
How to crack WPA/WPA2 Security?
John The Ripper
Social Engineering
Setting up a fake login page
Introduction to Malware
Types of Malware
Types of Malware (cont.) and steps to prevent malware infection
What is IOT?
Self Driving vehicle
Anatomy of an IOT attack
IoT attack demonstration
Physical security
Operations security
Information security control and laws