Dərs axtar
Progress
Module 0 - Mindset Shift
1:36
Free
1:36
Free
4:36
Free
Task 1 & Research 1 must be done after watching this module.
Task 2 & Research 2 must be done after watching this module.
Module X – Expert Podcast Series
2:01
Free
1:23:32
1:03:32
Module Y – Living Hacking Series
Module Z – Real World
MONTH I
Module 1 - Awakening
19:42
Free
21:44
21:23
15:43
04:23
Task 3 & Research 3 must be done after watching this module.
Module 2 - Linux Mastery
10:50
29:25
29:25
31:06
Free
06:47
Free
29:25
17:37
Free
16:02
Free
31:13
Free
11:58
Free
Task 4 & Research 4 must be done after watching this module.
Module 3 - Networking and Traffic Control
21:55
Free
21:55
21:55
32:23
17:29
Task 5 & Research 5 must be done after watching this module.
Operational Readiness Interview
Passing this interview is mandatory for progression to Month 2.
MONTH II
Bütün Dərslər

Dərs axtar
Session 1 - Rewire Your Brain
Session 1 - Rewire Your Brain
Session 2 - Legal and Ethical Boundaries [Disclaimer]
Session 2 - Legal and Ethical Boundaries [Disclaimer]
Session 3 - Cybersecurity Laws and Prohibited Activities
Session 3 - Cybersecurity Laws and Prohibited Activities
Session 4 - Mentorship System
Session 4 - Mentorship System
Session 5 - Mentor Communication Protocol
Session 5 - Mentor Communication Protocol
Session 6 - Shiny Object Syndrome
Session 6 - Shiny Object Syndrome
Session 7 - Daily Discipline
Session 7 - Daily Discipline
Session 8 - The Ethical Hacking Failure Pattern (90%)
Session 8 - The Ethical Hacking Failure Pattern (90%)
Session 9 - Digital Self-Control
Session 9 - Digital Self-Control
Session 10 - Learning Platform Orientation
Session 10 - Learning Platform Orientation
Session 11 - Weekly Task
Session 11 - Weekly Task
Session 12 - Weekly Research
Session 12 - Weekly Research
Session 13 - Daily Cyber Intelligence
Session 13 - Daily Cyber Intelligence
Session 14 - Core Cybersecurity Reading List
Session 14 - Core Cybersecurity Reading List
Session 0 - Awakening
Session 0 - Awakening
Session 1 - The Reality of Cybersecurity
Session 1 - The Reality of Cybersecurity
Session 2 - The Cybercrime Explosion + AI
Session 2 - The Cybercrime Explosion + AI
Session 3 - Two Side of Cybersecurity: Red and Blue
Session 3 - Two Side of Cybersecurity: Red and Blue
Session 4 - Who Hackers Really Are
Session 4 - Who Hackers Really Are
Session 5 - Defining Your Cybersecurity Path
Session 5 - Defining Your Cybersecurity Path
Session 6 - Hacker Archetypes: White, Black, Grey
Session 6 - Hacker Archetypes: White, Black, Grey
Session 7 - Inside Real-World Breaches
Session 7 - Inside Real-World Breaches
Session 8 - OPSEC Fundamentals: Staying Invisible
Session 8 - OPSEC Fundamentals: Staying Invisible
Session 9 - Digital Footprints and Identity Leakage
Session 9 - Digital Footprints and Identity Leakage
Session 10 - The Cybercrime Ecosystem
Session 10 - The Cybercrime Ecosystem
Session 11 - Hacking Law and Legal Exposure in Azerbaijan
Session 11 - Hacking Law and Legal Exposure in Azerbaijan
Session 0 - Linux for Hackers
Session 0 - Linux for Hackers
Session 1 - Virtualization and Isolated Lab Environments
Session 1 - Virtualization and Isolated Lab Environments
Session 2 - Why Kali Linux Exists
Session 2 - Why Kali Linux Exists
Session 3 - The Evolution of Linux
Session 3 - The Evolution of Linux
Session 4 - Kali Linux Deployment and Setup
Session 4 - Kali Linux Deployment and Setup
Session 5 - Navigating the Kali Linux Environment
Session 5 - Navigating the Kali Linux Environment
Session 6 - Command-Line Operations and Shell Control
Session 6 - Command-Line Operations and Shell Control
Session 7 - Linux Permission Model and Access Control
Session 7 - Linux Permission Model and Access Control
Session 8 - Text Editing in Linux Environments
Session 8 - Text Editing in Linux Environments
Session 9 - Package Management and System Maintenance
Session 9 - Package Management and System Maintenance
Session 10 - TryHackMe Platform Orientation
Session 10 - TryHackMe Platform Orientation
Session 11 - Linux Fundamentals I: Core System Usage
Session 11 - Linux Fundamentals I: Core System Usage
Session 12 - Linux Fundamentals II: Files, Users, Processes
Session 12 - Linux Fundamentals II: Files, Users, Processes
Session 13 - Linux Fundamentals III: Networking and Services
Session 13 - Linux Fundamentals III: Networking and Services
Session 14 - Practical Linux Workflow Optimization
Session 14 - Practical Linux Workflow Optimization
Session 15 - Bash Scripting Fundamentals
Session 15 - Bash Scripting Fundamentals
Session 0 - Networking and Traffic Control
Session 0 - Networking and Traffic Control
Session 1 - Networking for Hackers
Session 1 - Networking for Hackers
Session 2 - VPNs: Purpose, Myths, and Limitations for Hackers
Session 2 - VPNs: Purpose, Myths, and Limitations for Hackers
Session 3 - Networking Fundamentals for Attackers
Session 3 - Networking Fundamentals for Attackers
Session 4 - TCP/IP Model and Protocol Behavior
Session 4 - TCP/IP Model and Protocol Behavior
Session 5 - MITM Attacks: Concepts and Scenarios
Session 5 - MITM Attacks: Concepts and Scenarios
Session 6 - Traffic Analysis with Wireshark
Session 6 - Traffic Analysis with Wireshark
Session 7 - Packet Sniffing Techniques
Session 7 - Packet Sniffing Techniques
Session 8 - ARP Spoofing Mechanics
Session 8 - ARP Spoofing Mechanics
Session 9 - DNS Spoofing and Traffic Redirection
Session 9 - DNS Spoofing and Traffic Redirection
Session 10 - Network-Level Attack Chains
Session 10 - Network-Level Attack Chains
Session 11 - Real-World Network Breaches Explained
Session 11 - Real-World Network Breaches Explained
Conversations with Industry Hackers
Conversations with Industry Hackers
John Hammond: Red Teaming, Malware, and Real-World Skills
John Hammond: Red Teaming, Malware, and Real-World Skills
Ralph Echemendia: Social Engineering and Human Exploitation
Ralph Echemendia: Social Engineering and Human Exploitation
Module Y - Live Hacking
Module Y - Live Hacking
Live Hacking Session 01.05.2025
Live Hacking Session 01.05.2025
Live Hacking Session 07.05.2025
Live Hacking Session 07.05.2025
Live Hacking Session 14.05.2025
Live Hacking Session 14.05.2025
Live Hacking Session 21.05.2025
Live Hacking Session 21.05.2025
Live Hacking Session 28.05.2025
Live Hacking Session 28.05.2025
Live Hacking Session 07.06.2025
Live Hacking Session 07.06.2025
Live Hacking Session 14.06.2025
Live Hacking Session 14.06.2025
Live Hacking Session 21.06.2025
Live Hacking Session 21.06.2025
Live Hacking Session 28.06.2025
Live Hacking Session 28.06.2025
Live Hacking Session 07.07.2025
Live Hacking Session 07.07.2025
Live Hacking Session 14.07.2025
Live Hacking Session 14.07.2025
Module Z - Real World
Module Z - Real World
Job Hunting
Job Hunting
LinkedIn Mastery
LinkedIn Mastery
CV Mastery
CV Mastery
University Mastery
University Mastery