Course curriculum

  • 1

    Hacking 101 Intro

    • Hacking 101 Intro a

    • Hacking 101 Intro b

    • Hacking 101 Intro c

    • Alnafi Linux

    • CODS_track_deep_dive_for_Pentesting_Forensics_and_threat_huntering

    • Hacking_101_AKA_ethical_hacking_in_line_with_best_practices_and_standard

    • How to Study CODS and Data Science Together and be job or freelancing ready in 9 to 12 months.

  • 2

    ISO 27035 a quick review to understand Incident Response Management

    • Hacking 101 ISO 27035 review part 1

    • Hacking 101 ISO 27035 standard review part 1

    • Policy and other key templates

    • NIST.SP.800-61r2 incident response management (Read this document end to end, otherwise you will fail in this course.)

  • 3

    Parrot OS our distro for pentesting and forensics

    • Hacking 101 Parrot OS download

    • Parrot OS VMware Installation

    • How to use osboxes ready made images to install ubuntu or centos or parrot os part 1

    • How to use osboxes ready made images to install ubuntu or centos or parrot os part 2

    • How to use osboxes ready made images to install ubuntu or centos or parrot os part 3

    • How to use osboxes ready made images to install ubuntu or centos or parrot os part 4

    • How to Study Offensive Pentesting and Data Science Together and be job or freelancing ready in 9 to 12 months.

  • 4

    ISO 27035 Revisit

    • Hacking 101 ISO 27035 revisit part 1. (There are no slides, only video is provided)

    • Hacking 101 ISO 27035 revisit part 2. (There are no slides, only video is provided)

  • 5

    NIST Incident Hanlding Document Revist Deep dive. (MUST Read this document atleast 8 times.)

    • NIST Incident Handling Document Review part 1

    • NIST Incident Handling Document Review part 2

    • NIST.SP.800-61r2 incident response management

  • 6

    Deep Dive Hacking Mindset with labs

    • Deep Dive Hacking Mindset part 1

    • GRR Rapid Response Challenge Lab (Help each other and try to attempt this on your own)

    • Jump Bag for Security Professionals

    • Deep Dive Hacking Mindset part 2

    • The Cyber Security NIST Framework

    • Key Documents to read for Cyber Security Framework from NIST

    • How to open a command prompt as administrator

    • Network Detection Challenge Lab using netstat

    • Hands on Lab for Windows key services part 1

    • Hands on Lab for Windows key services part 2

    • Hands on Lab for Windows key services part 3

  • 7

    Challenge Lab for SysInternal

    • Challenge Lab for Creating a Systenal Software using DS Method

  • 8

    IR Table Top Excercise

    • Lab IR Table Top Excercise

    • Incident Response Table Top Exercise (A team roll playing excercise)

  • 9

    Lab: Going down the Linux Rabbit hole

    • Lab for Linux deep dive covering your tracks part 1

    • Lab for Linux deep dive covering your tracks part 2 (Part Challenge Lab)

  • 10

    Lab RITA next steps in threat hunting.

    • RITA lab part 1

    • RITA lab part 2

  • 11

    OSINT Lab deep dive

    • OSINT Lab part 1

    • OSINT Lab part 2

    • OSINT Lab part 3

  • 12

    Major Challenge Lab Creating a Shodan like tool

    • Shodan Challenge Lab

    • Shodan complete guide

  • 13

    ';--have i been pwned?

    • have i been pwned

  • 14

    #Spyse Tool

    • Spyse walkthrough

  • 15

    Google Exploit Database

    • Google exploit database

  • 16

    Maltego and Dark Trace the future

    • Maltego and Dark trace the future of Cyber Security

  • 17

    Tools on parrot OS and installing creepy and running it as a test run

    • Misc tools and installing creepy to run some test cases

  • 18

    MITRE ATT&CK, Chain of Custody and Security ops

    • MITRE attack chain of custody and security ops

  • 19

    The role of CSIRT, ENISA, and First in overall IM process globally

    • The role of CSIRT in your Organization

    • Security Bootcamp Part 1 from FIRST

    • FIRST Security Bootcamp (2-5)- How does the Internet work

    • FIRST Security Bootcamp (3-5)- Cybercrime

    • FIRST Security Bootcamp (4-5)- Protect yourself

    • FIRST Security Bootcamp (5-5)- You got hacked, now what - Incident Response

    • FIRST presentation notes

    • How to Study Digital Forensics and Data Science Together and be job or freelancing ready in 9 to 12 months.

  • 20

    The Role of Senior Mgmt, CPR and wordWebBugs

    • The role of Senior Mgmt, CPR and short term strategies

    • Learning about WordWebBugs

  • 21

    Affected parties, write blockers, short & long term IM goals

    • Affected parties, write blockers, short & long term IM goals

    • Challenge Lab: Rekall

  • 22

    Lessones learned in Incident Response Management

    • Lessons learned part 1

    • Lessons learned part 2

  • 23

    Review on how to install MS SCCM in your lab

    • Challenge read to know what is SCCM and how it can help an organization Incident Response Process

  • 24

    Kansa Challenge Lab and Applied Incident Response Management

    • Kansa Challenge lab and Applied Incident Response Mgmt

    • Kansa Links to follow

    • Applied Incindet Managment and wrapping up part 1 of hacking 101

    • 2020-Global-Cost-of-Insider-Threats-Ponemon-Report_UTD (please read this document)

  • 25

    Hacking 101 Quiz 1

    • Hacking 101 Quiz 1 for Section 1. Rules and Regulations!

    • Quiz 1 Section 1 (5 questions)

  • 26

    Hacking mind set deep dive into networks

    • Hacking 101 Deep dive into hacking mindset 01

    • Hacking 101 Deep dive into hacking mindset 02

    • 2020 Global Threat report by crowdstrike please read carefully.

    • Hacking 101 Deep dive into hacking mindset 03

    • apt-groups-you-should-know-v3

    • Hacking 101 Deep dive into hacking mindset 04 case study marriott hotels

    • Marriott data breach FAQ How did it happen and what (Translate this into Multiple languages and read please)

    • Hacking 101 Deep dive into hacking mindset 05 The golden age of hacking

    • Hacking 101 Deep dive into hacking mindset 06 whois and reverse Whois

    • Hacking 101 Deep dive into hacking mindset 07 DNS interrogration Techniques

    • Power up your Parrot OS Virtual Image as we will start using it for Nmap next

    • Hacking 101 Deep dive into hacking mindset 07 DNS recond defences

    • Hacking 101 Deep dive into hacking mindset 07 website reconnaissance techniques

    • Hacking 101 Deep dive into hacking mindset 07 puhspin (Challenge lab)

    • PushPin Application For Challenge Lab

    • Hacking 101 Deep dive into hacking mindset 07 FOCA Challenge Lab

    • FOCA Challenge Lab Link

    • Hacking 101 Deep dive into hacking mindset 07 Google Diggity Challenge Lab a

    • Hacking 101 Deep dive into hacking mindset 07 Google Diggity Challenge Lab b

    • Google Diggity Tool Challenge Lab download

    • The_ISSA_Journal-SearchDiggity_Dig_Before_They_Do-Sept_2012

    • InformationWeek_Reports-Using_Google_to_Find_Vulnerabilities_in_Your_IT_Environment-05Mar2012

    • Hacking 101 Deep dive into hacking mindset 07 Google breachalarms and recon-ng Challenge Lab

    • Recon-NG Challenege tool lab

    • Hacking 101 Deep dive into hacking mindset 07 Google search engines recon defenses

  • 27

    Maltego Challenge Lab

    • Hacking 101 Deep dive into hacking mindset 07 Maltego Challenge Lab

    • Maltego Challenge Lab Download link

    • Maltego Guides

    • Case Study Reading Bitcoin Forensics with Maltego and CipherTrace Blockchain Intelligence - Maltego

    • Case Study Reading Uncovering a New Angler-Bedep Actor · swannysec

    • Case Study Reading Using Maltego for cell phone analysis and geolocation with OSINT. _ by AndyF1 _ Medium

    • Case Study Reading Maltego and OSINT for crime scene analysis _ by AndyF1 _ Medium

    • Case Study Reading Finding FQDNs associated with IPv4 ranges with Farsight DNSDB - Maltego

    • Case Study Reading Network Footprinting with Machines in Maltego! - Maltego

    • Case Study Reading Fighting Cyberbullies and Harassment with Martial Art and Maltego - Maltego

    • Case Study Reading Enrich Your Maltego Graph by Customizing Entity Overlay Icons - Maltego

    • Case Study Reading Maltego Stealth Mode_ Conduct Investigations Securely and Privately - Maltego

    • Network footprinting with Maltego _ Maltego Support

    • Case Study Reading Trumpworld table to Maltego graph _ Maltego Support

    • Case Study Reading How to_ Shodan _ Maltego Support

  • 28

    Hacking 101 mindset the next phase

    • Hacking 101 Deep dive into hacking mindset 08 Self exploration Challenge Lab

    • Hacking 101 Deep dive into hacking mindset 09 Nmap self exploration Challenge Lab

    • Hacking 101 Deep dive into hacking mindset 10 War dialing Challenge Lab

    • war dialing article

    • ‘War Dialing’ Tool Exposes Zoom’s Password Problems — Krebs on Security

    • Wardialing - Wikipedia

    • War Dialing Penetration Test - HackLabs

    • WarVOX Download - War Dialing Tool Software - Darknet

    • War Dialing Part 1_ The VoIP and Analog Primer _ Optiv

    • Think before you speak_ voice recognition replacing the password - Information Age

    • War Dialing

  • 29

    Hacking 101 mindset the wireless hacking area

    • Hacking 101 Deep dive into hacking mindset 11 wireless hacking using inSSIDer challenge lab

    • inSSIDer, please download this software.

    • Choose The Best WiFi Analyzer For Your iPhone

    • Check the best WiFi analyzer apps for Android

    • Hacking 101 Deep dive into hacking mindset 12 Kismet challenge lab

    • Hacking 101 Deep dive into hacking mindset 13 Wifi protocols and PSK

    • Understanding PSK Authentication - TechLibrary - Juniper Networks

    • WiFi Security_ WEP, WPA, WPA2 And Their Differences

    • What Are the Different Security Protocols for Wireless Networks_ _ RSI Security

    • Hacking 101 Deep dive into hacking mindset 14 aircrack ng challenge lab

    • Hacking 101 Deep dive into hacking mindset 15 Hac7 starting your own business

    • Hacking 101 Deep dive into hacking mindset 16 I Love my neighbors Challenge lab

    • Hacking 101 Deep dive into hacking mindset 17 hostapd-wpe Challenge lab

    • Hacking 101 Deep dive into hacking mindset 18 non wifi technologies review

    • Top 7 IOT Technologies and Protocols _ by Aakash Kumar _ Medium

    • Hacking 101 Deep dive into hacking mindset 19 Wireless hacking of keyboards and drones hacking Challenge Lab

    • Hacking 101 Deep dive into hacking mindset 20 Protection Defences for Wifi and non Wifi protocols

    • Hacking 101 Deep dive into hacking mindset 21 Netscout intro

    • Hacking 101 Deep dive into hacking mindset 22 Nmap the second step

    • Hacking 101 Deep dive into hacking mindset 23 challenge lab how to scan the whole internet using masscan

    • Masscan Examples_ From Installation to Everyday Use _ Daniel Miessler

    • Hacking 101 Deep dive into hacking mindset 24 Ipv4 vs Ipv6 what are the differences

    • IPv6 Subnetting - How and Why to Subnet IPv6

    • IPv4 vs. IPv6 Benefits - What is it_ _ ThousandEyes

    • Internet Protocol - IPv4 vs IPv6 as Fast As Possible

    • Hacking 101 Deep dive into hacking mindset 25 Nmap challenge lab for running zenmap

    • Hacking 101 Deep dive into hacking mindset 26 How to defend against ping sweep and traceroute

    • Hacking 101 Deep dive into hacking mindset 26 How to defend against ping sweep and traceroute end part

    • Hacking 101 Deep dive into hacking mindset 27 Challenge lab for testing network scanning tools

    • Challenge lab tools links

    • Hacking 101 Deep dive into hacking mindset 28 TCP Hand Shake Process

    • TCP 3-Way Handshake Process

    • Protocols for Packet Quantum Network additional reading material recommended

    • Reading and research by ANA

    • Hacking 101 Deep dive into hacking mindset 29 TCP and UDP Packets whats underneath

    • A_Survey_of_Protocol-Level_Challenges_and_Solution (A reading material to understand TCP context as per SCADA track)

    • Reading material as per SCADA Track

    • TCP/IP Reference reading must be done of this article

    • How to Study SCADA Cyber Security and Data Science Together and be job or freelancing ready in 9 to 12 months.

  • 30

    AL Nafi Linux and Nmap

    • Hacking 101 Deep dive into hacking mindset 30 nmap stage 1

    • Hacking 101 Deep dive into hacking mindset 30 nmap stage 2

    • Target Specification

    • Hacking 101 Deep dive into hacking mindset 30 nmap stage 3 nano editor learning the ropes

    • Scan Techniques short cuts

    • Hacking 101 Deep dive into hacking mindset 30 nmap stage 4 how to discover host and arp

    • Host Discovery Short cuts

    • Hacking 101 Deep dive into hacking mindset 30 nmap stage 5 how to discover hosts further and play with the commands

    • Port Specification Short cuts

    • Hacking 101 Deep dive into hacking mindset 30 nmap stage 6 how to discover and services using V command

    • Service and Version Detection Short cuts

    • OS Detection Short cuts