• Post category:StudyBullet-5
  • Reading time:7 mins read

What you will learn



Linux Files

Linux Fundamentals

Linux Networking

Linux Software Control

Cybersecurity Fundamentals


Ethical hacking is the identification and exploitation of security vulnerabilities for the purpose of improving an organisation’s cyber security. Ethical hacking helps organisations improve their security status by uncovering exposures that are beneath the surface and providing support to address them.

An ethical hacker, also commonly referred to as a white hat hacker, is a cyber security professional entrusted to perform ethical hacking assessments. Certified ethical hackers possess a comprehensive understanding of the tactics and techniques that malicious ‘black hat’ attackers use and leverage this knowledge to ensure that ethical hacking assessments accurately reflect real-life adversarial approaches.

The term ethical hacking is used to describe a broad range of assessment types. From penetration tests performed over a matter of days, to red team operations conducted over weeks and months, ethical hacking engagements vary significantly in scope, duration and price.

Although ethical hacking is sometimes used interchangeably with penetration testing, there are some important differences.

Get Instant Notification of New Courses on our Telegram channel.

DealsCrown Telegram Banner

Ethical hackers may get involved in tactics beyond penetration testing. For example, they might choose to test defenses against social engineering techniques by encouraging employees to reveal sensitive business data or log-in credentials.

On the other hand, penetration testing is focused solely on assessing one or a few network vulnerabilities that organizations may have.



Cybersecurity – Beginning

What is Cyber Security
Windows Firewall

Linux – File System

Linux – Filesystem Part 1
Linux – Filesystem Part 2
Linux – Logging and Remaining Stealthy
Linux Creating our own Web Server

Linux – Working with Archive files

Linux – Working With Archive Files 1
Linux – Working With Archive Files 2

Linux – Working With Files and Permissions

Linux Working With Files – Part 1
Linux Working With Files – Part 2

Linux – Working with Processes

Working with Processes – Part 1
Linux Filtering Processes
Working With Processes – Part 2
Working with Processes – Part 3

Linux – Working With USER Enviroment Variables

User Enviroment Variable Introduction
Changing Enviroment Variables
Editing and Creating New Variables

Linux – Networking

Fundamentals of Linux Introduction
Dealing With Files
Linux Network Manipulation – Part 1
Linux Mac Adress Spoofing
Changing DNS in Linux
Manipulating Hosts File

Linux – Software Control

Linux APT Part 1
Linux APT Part 2


TCP-IP – Part 1
TCP-IP – Part 2
TCP-IP – Part 3
TCP-IP – Part 4
TCP-IP – Part 5

Networking – Capturing Network Traffic

Passive Capture and Wireshark
Active and Passive Capture

Information Gathering

Introduction to Information Gathering
DNS Info Gathering
Maltego – Part 1
Reconnaissance and Footprinting

Mastering Metasploit

Installing Metasploitable
Installing Metasploit
Metasploit Basics – Part 1
Metasploit Basics – Part 2
Metasploit Basics – Part 3
Running NMAP in Metasploit and Port Scanning
Exploiting SMB Ports
Metasploit Passive Information Gathering – Part 1
Metasploit – Finding Subdomains
Metasploit – TCP Port Scanning
Metasploit – TCP SYN Port Scanning
Metasploit – Passive Information Gathering – Part 2
Metasploit – Version Detection