01 Prerequisites for getting started with this course 02 Basic hacking terms you will want to know getting started 03 Build your hacking environment! 04 Set up instructions for Mac users ONLY 05 How to create a bootable USB of Kali Linux ( optional ) 06 Updates_ How to install VirtualBox on Fedora 22 + Kali Sana VM ( OPTIONAL ) 07 Linux Terminal including basic functionalities and CLI 08 What is Tor_ How can you use it to protect your anonymity online 09 ProxyChains for using proxy servers_ hiding your ip_ and obtaining access 10 What is a Virtual Private Network (VPN) and how you can stay anonymous with VPN 11 What is a macchanger_ How can you use it to change your mac address 12 Footprinting with Nmap and external resources 13 Attacking wireless networks_ Overview of the tools 14 Breaking WPA_WPA2 encryption_ Wifi hacking and wifi hacker training 15 Signal jamming and denial of service 16 SSL strips 17 Let's have a bit of fun 18 Evil twin method! Clone wireless access points to steal data 19 Attacking routers to give you free reign over the entire network! 20 DNS setting hacking to redirect users with post authentication exploitation 21 Website attacks with SQL injections 22 Brute-forcing methods for cracking passwords 23 Denial of Service (DoS) attacks demonstrated and explained 24 Reverse shells_ Gain remote control of any device! 25 Make your own Keylogger in C++ 26 Retired
Price - Free Free on combined package !!! or Buy any 2 packages and get this package for Free !!!