Here is our course outline of what you will learn as soon as you get access. Each of these courses will last for 30 minutes and fully explained with practicals.
Prerequisitess success tips for getting the most out of this course
Basic terminoligy
creating the virtual environment
Installing VirtualBox
Installing VirtualBox on a Mac
Installing virtualBox on windows
Installing virtualBox using the default Package Manager
Installing a virtualBox Guest Addition
Kali Linux Installation within a Virual environment
Kali Linux installation after it is running and getting started using it
Setting up Kali Linux with VirtualBox
How to create a bootable USB of Kali with Persistent storage of 4GB P1
How to create a bootable USB of Kali with Persistent storage of 4GB P2
How to create a bootable USB of Kali with Persistent storage 4GB P3
Fedroa 22 virtualBox set up
Kali Sana virtual machine installation
How to install VBox GuestAdditions in Kali Sana
Introduction to the Linux terminal
Linux Command Line Interface CLI basics
The Linux CLI explained in greater detail to give you a good understanding
Setting up Kali Linux with VirtualBox part 2
How to set up a USB passthrough on a Mac part 1
How to set up a USB passthrough on a Mac part 2
Kali Linux Live USB on a MacBook Pro part 1
Kali Linux Live USB on a MacBook Pro part 2
Kali Linux Live USB on a MacBook Pro part 3
Tor part 1
Tor part 2
Proxychains part 1
Proxychains part 2
Proxychains part 3
VPN part 1
VPN part 2
Macchanger part 1
Macchanger part 2
Nmap part 1
Nmap part 2
External resources using public listings of known vulnerabilities
Intro to wifi hacker cracking WPA⁄WPA2
Aircrack and reaver installation
For Windows Users How To Set Up USB wireless Adapter with VirtualBox part 2
Aircrack ng crunch usage example 3
Cracking WPS pins with reaver part 1
Cracking WPS pins with reaver part 2
Cracking WPS pins with reaver part 3
Installing aircrack ng on Windows + crunch on Linux
For Windows Users How To Set Up USB wireless Adapter with Virtualbox Part 1
Aircrack ng crunch usage example 1
Aircrack ng crunch usage example 2
Performing denial of service on wireless networks part 1
Performing denial of service on wireless networks part 2
SSL strip part 1
SSL strip part 2
SSL strip part 3
Funny things part 1
Funny things part 2
Funny things part 3
Evil twin part 1
Evil twin part 2
Evil twin part 3
Using known vulnerabilities part 1
Using known vulnerabilities part 2
Using known vulnerabilities part 3
Post authentication exploitation DNS part 2
Post authentication exploitation DNS part 3
sql injection part 1
sql injection part 2
sql injection part 3
sql injection part 4
sql injection part 5
cracking hashes
cracking linux password with john the ripper part 1
cracking linux password with john the ripper part 2
cracking windows password with john the ripper
hydra usage part 1
hydra usage part 2
DoS attack demonstration part 1 Introduction to Denial of Service attacks
DoS attack demonstration part 2 Combine slowloris pl with nmap
DoS attack demonstration part 3 featuring ha ckers org
Intro to Metasploit and reverse shells What are reverse shells and why use them
Metasploit reverse shell part 2 starting from a two terminal setup
Making reverse shells persistent on another system and escalating privileges
Creating a persistent reverse shell with Metasploit
Using NetCat to make any kind of connection you might need
How to upload a reverse shell onto a web server
Setting up the Environment part 1
Setting up the Environment part 2
Programming basics part 1
Programming basics part 2
Programming basics part 3
Programming basics part 4
Programming basics part 5
Basic Key logger part 1
Basic Key logger part 2
Upper and lowercase letters
Encompassing other characters part 2
Encompassing other characters part 3
Hide key logger console window
Courses can be Access anytime and anywhere even on mobile, So you have every choice to choose when it will be convenient for you. Downloading of the courses will be made available if you want the courses permanently on your PC or storage device