Ethical Hacking


Description

Learn how hackers attack computers and networks, and how to protect Windows and Linux systems.
Suitable for those who understand the basics of the Internet and computer systems, but are new to security.

Projects

0: Binary Games    20
1: Kali VM    15
   1C: Google Cloud Machines    15
2: Windows VM    20
   2C: Metasploit & Nmap on Debian)    10
3: Armitage    15
   3C: Metasploit v. EasyFTP    10
4.1: Creating Infectious Media with Metasploit       15
5: Nmap    40
6: Wireshark    30
7: Essential Linux    30
8: Buffer Overflow    30
9: Scapy    15
10: Reset Windows Password    15
11: Quantum Computing    15
12: Windows Password Hashes    15
We Chall    

Resources

Download VMware Player 14
Download VMware-player-12.5.1-4542065.exe

Posted for WCIL 5-20-19