Go back
- Course Details
- Certificate
About Course
Ethical hacking, also known as penetration testing or white-hat hacking, involves authorized individuals or professionals using their technical skills to identify vulnerabilities and weaknesses in computer systems, networks, and applications. The goal is to improve the security posture of an organization by identifying potential security threats before malicious hackers do. Ethical hackers follow a strict code of ethics and obtain permission to test the security of a system, ensuring their actions are legal and ethical.
Who made this course?
Techie Josh Tamil is a youtube channel for Beginners who love to learn hacking technology in Tamil.
Course Syllabus
Ethical Hacking Tamil
0:00 Introduction
0:01:10 Course Introduction
Dedicated website portal overview
Basic Ethical Hacking Terminologies
1:15:41 Installing Kali Linux in Virtual Box
1:32:53 Bootable kali linux in USB
1:35:48 Learning to compile languages
1:47:22 Server and client concept
1:49:29 Creating your first php program
2:26:40 Burpsuite intro
XSS ATTACKS
2:33:36 Xss dom
2:38:39 Xss reflected
2:45:12 Xss stored
Browser Exploitation
2:55:37 Xss + beef = android
2:49:27 Beef redirection
3:08:29 Beef windows password
WiFi Attacks
3:15:50 Wifi - insider
3:22:27 Wep with aircrack ng
3:36:24 Wpa with aircrack ng
3:44:42 Wpa with fern cracker
3:49:16 Fake accesspoint
SQL INJECTI0N
3:55:44 Mysql Basics
Sql injection automated
Sql injection basics
5:28:34 SQL injection step by step
Web Attacks
6:04:01 Csrf
6:15:02 Passw0rd Cracking Ideas
6:38:40 Bruteforce
Network Attacks
6:51:50 Nmap
6:58:49 Zenmap
7:09:38 Info gathering ip scanner
Information Gathering
7:16:32 Info gathering browser tools
7:25:50 Information gathering website
7:29:17 Website recon
(Ph)ishing Attacks
7:26:55 Humenerror (ph)fishing
7:41:20 Hacking social media passwords
System Takeover
7:46:29 Android phone takeover
8:07:19 windows system takeover
Man in the middle
8:18:21 Cain and able
8:23:53 Sniffing
DOS
8:38:23 Dos- basic windows aftermath
8:34:16 Dos- website service
MISC
8:40:23 Information gathering email
8:47:33 Person info gathering tools
8:55:27 Ngr installation in kali
9:01:12 Lurking a person
9:04:02 Reverse-engineering
9:25:54 Defacing website
9:44:18 Command injection attack
9:51:34 Cryptography
10:23:36 Steganography
10:36:29 Anonymizing y0ur computer
Have doubts?
This course has been taken from the youtube. If you have any doubts regarding the course contact the owner or contact us through the following mode
[email protected]