IntroductionHacking lab setup
kali linux
Anonymity online
Dark Web
Network pentesting
Gathering information from network
Wireless attack
Post connection attack
System pentesting
Attack on user
Social engineering
Social media security
Beef
External network attacks
Fake game website attack introduction
Post hacking session
Hacker methodology
Website reconnaissance
Website pentesting
Cross site scripting
SQL
SQL injection
Website pentesting tool
Ethical hacking certificate
Python for ethical hacking setup
Python data types & structure introduction
Essential
Function
Object oriented programming
Module
MAC Changer
Network scanner
Man in the middle
Packet listener
Keylogger
Backdoor
Packaging and malicious file
Closing & ethical hacking handbook
Link: