Dərs axtar

Progress

Module 2 - Linux Mastery

Task 4 & Research 4 must be done after watching this module.

MONTH II

Bütün Dərslər

Dərs axtar

Session 1 - Rewire Your Brain

Session 1 - Rewire Your Brain

Session 2 - Legal and Ethical Boundaries [Disclaimer]

Session 2 - Legal and Ethical Boundaries [Disclaimer]

Session 3 - Cybersecurity Laws and Prohibited Activities

Session 3 - Cybersecurity Laws and Prohibited Activities

Session 4 - Mentorship System

Session 4 - Mentorship System

Session 5 - Mentor Communication Protocol

Session 5 - Mentor Communication Protocol

Session 6 - Shiny Object Syndrome

Session 6 - Shiny Object Syndrome

Session 7 - Daily Discipline

Session 7 - Daily Discipline

Session 8 - The Ethical Hacking Failure Pattern (90%)

Session 8 - The Ethical Hacking Failure Pattern (90%)

Session 9 - Digital Self-Control

Session 9 - Digital Self-Control

Session 10 - Learning Platform Orientation

Session 10 - Learning Platform Orientation

Session 11 - Weekly Task

Session 11 - Weekly Task

Session 12 - Weekly Research

Session 12 - Weekly Research

Session 13 - Daily Cyber Intelligence

Session 13 - Daily Cyber Intelligence

Session 14 - Core Cybersecurity Reading List

Session 14 - Core Cybersecurity Reading List

Session 0 - Awakening

Session 0 - Awakening

Session 1 - The Reality of Cybersecurity

Session 1 - The Reality of Cybersecurity

Session 2 - The Cybercrime Explosion + AI

Session 2 - The Cybercrime Explosion + AI

Session 3 - Two Side of Cybersecurity: Red and Blue

Session 3 - Two Side of Cybersecurity: Red and Blue

Session 4 - Who Hackers Really Are

Session 4 - Who Hackers Really Are

Session 5 - Defining Your Cybersecurity Path

Session 5 - Defining Your Cybersecurity Path

Session 6 - Hacker Archetypes: White, Black, Grey

Session 6 - Hacker Archetypes: White, Black, Grey

Session 7 - Inside Real-World Breaches

Session 7 - Inside Real-World Breaches

Session 8 - OPSEC Fundamentals: Staying Invisible

Session 8 - OPSEC Fundamentals: Staying Invisible

Session 9 - Digital Footprints and Identity Leakage

Session 9 - Digital Footprints and Identity Leakage

Session 10 - The Cybercrime Ecosystem

Session 10 - The Cybercrime Ecosystem

Session 11 - Hacking Law and Legal Exposure in Azerbaijan

Session 11 - Hacking Law and Legal Exposure in Azerbaijan

Session 0 - Linux for Hackers

Session 0 - Linux for Hackers

Session 1 - Virtualization and Isolated Lab Environments

Session 1 - Virtualization and Isolated Lab Environments

Session 2 - Why Kali Linux Exists

Session 2 - Why Kali Linux Exists

Session 3 - The Evolution of Linux

Session 3 - The Evolution of Linux

Session 4 - Kali Linux Deployment and Setup

Session 4 - Kali Linux Deployment and Setup

Session 5 - Navigating the Kali Linux Environment

Session 5 - Navigating the Kali Linux Environment

Session 6 - Command-Line Operations and Shell Control

Session 6 - Command-Line Operations and Shell Control

Session 7 - Linux Permission Model and Access Control

Session 7 - Linux Permission Model and Access Control

Session 8 - Text Editing in Linux Environments

Session 8 - Text Editing in Linux Environments

Session 9 - Package Management and System Maintenance

Session 9 - Package Management and System Maintenance

Session 10 - TryHackMe Platform Orientation

Session 10 - TryHackMe Platform Orientation

Session 11 - Linux Fundamentals I: Core System Usage

Session 11 - Linux Fundamentals I: Core System Usage

Session 12 - Linux Fundamentals II: Files, Users, Processes

Session 12 - Linux Fundamentals II: Files, Users, Processes

Session 13 - Linux Fundamentals III: Networking and Services

Session 13 - Linux Fundamentals III: Networking and Services

Session 14 - Practical Linux Workflow Optimization

Session 14 - Practical Linux Workflow Optimization

Session 15 - Bash Scripting Fundamentals

Session 15 - Bash Scripting Fundamentals

Session 0 - Networking and Traffic Control

Session 0 - Networking and Traffic Control

Session 1 - Networking for Hackers

Session 1 - Networking for Hackers

Session 2 - VPNs: Purpose, Myths, and Limitations for Hackers

Session 2 - VPNs: Purpose, Myths, and Limitations for Hackers

Session 3 - Networking Fundamentals for Attackers

Session 3 - Networking Fundamentals for Attackers

Session 4 - TCP/IP Model and Protocol Behavior

Session 4 - TCP/IP Model and Protocol Behavior

Session 5 - MITM Attacks: Concepts and Scenarios

Session 5 - MITM Attacks: Concepts and Scenarios

Session 6 - Traffic Analysis with Wireshark

Session 6 - Traffic Analysis with Wireshark

Session 7 - Packet Sniffing Techniques

Session 7 - Packet Sniffing Techniques

Session 8 - ARP Spoofing Mechanics

Session 8 - ARP Spoofing Mechanics

Session 9 - DNS Spoofing and Traffic Redirection

Session 9 - DNS Spoofing and Traffic Redirection

Session 10 - Network-Level Attack Chains

Session 10 - Network-Level Attack Chains

Session 11 - Real-World Network Breaches Explained

Session 11 - Real-World Network Breaches Explained

Conversations with Industry Hackers

Conversations with Industry Hackers

John Hammond: Red Teaming, Malware, and Real-World Skills

John Hammond: Red Teaming, Malware, and Real-World Skills

Ralph Echemendia: Social Engineering and Human Exploitation

Ralph Echemendia: Social Engineering and Human Exploitation

Module Y - Live Hacking

Module Y - Live Hacking

Live Hacking Session 01.05.2025

Live Hacking Session 01.05.2025

Live Hacking Session 07.05.2025

Live Hacking Session 07.05.2025

Live Hacking Session 14.05.2025

Live Hacking Session 14.05.2025

Live Hacking Session 21.05.2025

Live Hacking Session 21.05.2025

Live Hacking Session 28.05.2025

Live Hacking Session 28.05.2025

Live Hacking Session 07.06.2025

Live Hacking Session 07.06.2025

Live Hacking Session 14.06.2025

Live Hacking Session 14.06.2025

Live Hacking Session 21.06.2025

Live Hacking Session 21.06.2025

Live Hacking Session 28.06.2025

Live Hacking Session 28.06.2025

Live Hacking Session 07.07.2025

Live Hacking Session 07.07.2025

Live Hacking Session 14.07.2025

Live Hacking Session 14.07.2025

Module Z - Real World

Module Z - Real World

14:23

Free

Job Hunting

14:23

Free

Job Hunting

LinkedIn Mastery

LinkedIn Mastery

45:02

Free

CV Mastery

45:02

Free

CV Mastery

University Mastery

University Mastery