A related playlist for the following on Youtube.

Following list from here.
00. Free Videos - Learning White Hat Hacking And Penetration Testing
	What You Should Expect From The Video
	About Me
	Methodology
	What Is Footprinting?
	Mining For Information Using Google Hacking
	UDP
	Cryptographic Analysis
	Vulnerability Scanning
	Password Cracking And Complexity
	Malware Analysis
	DoS Attacks
	Wireless Sniffing
	De-Compilation
00. Free Videos - Advanced White Hat Hacking And Penetration Testing
	What You Will Learn
	About Ric Messier
	Ethical Hacking
	Importing Data With Dradis
	Stealth Scanning
	Using Wappalyzer
	Starting Up Metasploit
	Running Burp Suite
	Buffer Overflows
	File And Network Fuzzing With Peach
01. Learning White Hat Hacking And Penetration Testing - Introduction
	0101 What You Should Expect From The Video
	0102 What Is Hacking?
	0103 Why Do We Hack?
	0104 Types Of Hacking (Ethical, Black Hat, Gray Hat, Hacktivism, Etc)
	0105 Being Ethical
	0106 Legal Issues Around Hacking
	0107 Methodology
	0108 Types Of Attacks
	0109 Skills Necessary And Skills To Be Learned
	0110 What Is Penetration Testing/Scope?
02. Learning White Hat Hacking And Penetration Testing - Getting The Background - Footprinting And Reconnaissance
	0201 What Is Footprinting?
	0202 History Lessons - Way Back Machine
	0203 Using Your Resources - Job Listings, People Searches, Social Networks
	0204 Using Whois Lookups
	0205 Using DNS To Extract Information
	0206 Finding Network Ranges
	0207 Google Hacking
	0208 Mining For Information Using Google Hacking
	0209 Google Hacking Database
03. Learning White Hat Hacking And Penetration Testing - Networking Fundamentals
	0301 History Of TCP/IP
	0302 Using Wireshark To Examine Packets
	0303 OSI And IP Models
	0304 Addressing
	0305 UDP
	0306 TCP
	0307 Services
	0308 Using Wireshark For Deep Analysis
	0309 DHCP
	0310 Using ARP - Address Resolution Protocol - Ettercap
04. Learning White Hat Hacking And Penetration Testing - Cryptography
	0401 History Of Cryptography
	0402 Types Of Cryptography
	0403 Public Key
	0404 Certificates
	0405 Hashing
	0406 AES, DES, 3DES
	0407 SSL/TLS
	0408 SSH
	0409 Disk Encryption
	0410 Cryptographic Analysis
05. Learning White Hat Hacking And Penetration Testing - Scanning And Enumeration
	0501 Types Of Scans
	0502 Using NMAP
	0503 Other Types Of Scans
	0504 Using hping And Its Uses  Hping PackETH
	0505 War Dialing
	0506 IDS Evasion
	0507 Banner Grabbing
	0508 Vulnerability Scanning
	0509 Using Nessus
	0510 Enumeration Techniques
	0511 SNMP
	0512 LDAP
	0513 Using Proxies  - OWASP ZAP
	0514 Tor And Anonymizers
	0515 Tunneling
06. Learning White Hat Hacking And Penetration Testing - Penetration 
	0601 Goals
	0602 Password Cracking And Complexity - Ophcrack, John the Ripper, Cain and Able
	0603 Password Attacks - Lophtcrack
	0604 Password Storage Technique 
	0605 Privilege Escalation
	0606 Spyware, Rootkits And Key Loggers
	0607 Metasploit Basics
	0608 Auditing/Logging
	0609 Metasploit Again
07. Learning White Hat Hacking And Penetration Testing - Malware - Trojans, Backdoors, Viruses And Worms
	0701 Definitions And History
	0702 Detection Of Malware
	0703 Anti-Virus Evasion
	0704 Deployment Of Malware  - Zeus and EliteWrap
	0705 Virus Types
	0706 Malware Analysis
	0707 Windows ADS And Hiding Malware
	0708 Doing Debugging - OllyDbg    Ollydbg  Immunity Debugger
	0709 Packing And Automated A/V Maker Tools - zeus builder
	0710 More Malware Analysis 
08. Learning White Hat Hacking And Penetration Testing - Denial Of Service Attacks
	0801 What Is DoS? DDoS?
	0802 DoS Attacks - PacketStormSecurity.com
	0803 Cyber Crime
	0804 Botnets
	0805 Attack Countermeasures - Flooding
09. Learning White Hat Hacking And Penetration Testing - Web Application Hacking
	0901 What Is Web Application Testing?  - Burp Suite  Vicnum Project
	0902 Web Application Architecture
	0903 Web Testing Tools  Burp Suite Professional  OWASP ZAP
	0904 Cross Site Scripting
	0905 SQL Injection
	0906 Cross Site Request Forgery
	0907 Session Hijacking And Attacks And Cookies
	0908 Password Attacks
	0909 Encoding
10. Learning White Hat Hacking And Penetration Testing - Wireless Networking
	1001 Wireless Networking
	1002 Encryption Techniques - WEP, WPA, WPA2
	1003 Finding Hotspots
	1004 Breaking WEP Encryption
	1005 Rogue Access Points And Attacks
	1006 Wireless Sniffing
	1007 Protecting Wireless Networks
11. Learning White Hat Hacking And Penetration Testing - Detection Evasion
	1101 What Is Evasion And Why Do We Use It?
	1102 Steganography
12. Learning White Hat Hacking And Penetration Testing - Programming Attacks
	1201 Stacks And Heaps
	1202 Buffer Overflows
	1203 Protecting Against Buffer Overflow Attacks
	1204 Format String
	1205 De-Compilation
	1206 Reverse Engineering
13. Learning White Hat Hacking And Penetration Testing - About The Author
	1301 About Me


Note Links


 
Categories: ComputingHacking

0 Comments

Leave a Reply

Avatar placeholder

Your email address will not be published. Required fields are marked *