Section 1: Introduction to Ethical Hacking! What is it?

Section 2: Setting Up the Lab Environment

Section 3: Kali Linux Basics

Section 4: Network Penetration Testing

Section 5: Network Penetration Testing – Pre Connection Attacks

Section 6: Network Penetration Testing – Gaining Access To Networks

Section 7: Network Penetration – Post Connection Attacks

Section 8: Network Penetration – Detection & Security

Section 9: Gaining Access to Computers – Server Side Attacks

Lecture 2: Why learn hacking