Section 2: Basic commands

Section 3: Prepare your lab

Section 4: Footprinting

Section 5: Scanning

Section 6: Web penetration testing

Section 7: WPA2 cracking

Section 8: Man in the middle

Section 9: System hacking

Section 10: Python basics

Section 11: Coding advance backdoor

Section 12: Creating keylogger for backdoor

Section 13: Basic authentication bruteforcer

Lecture 4: Going full screen in Kali Linux!