{"id":35,"date":"2018-09-27T00:22:00","date_gmt":"2018-09-26T22:22:00","guid":{"rendered":"https:\/\/kindsonthegenius.com\/blog\/2018\/09\/27\/beginner-ethical-hacking-course-outline-with-practicals\/"},"modified":"2020-08-22T14:31:35","modified_gmt":"2020-08-22T12:31:35","slug":"beginner-ethical-hacking-course-outline-with-practicals","status":"publish","type":"post","link":"https:\/\/kindsonthegenius.com\/blog\/beginner-ethical-hacking-course-outline-with-practicals\/","title":{"rendered":"Beginner Ethical Hacking Course Outline With Practicals"},"content":{"rendered":"<p>We in the <a href=\"https:\/\/www.facebook.com\/groups\/1447709731988533\/\" target=\"_blank\" rel=\"noopener\">International Computer Programmer&#8217;s group<\/a> are happy to commence creating an Beginner Ethical Hacking Course for you!<\/p>\n<div style=\"clear: both; text-align: center;\"><\/div>\n<p>Every week we would publish a video lesson on one of the lessons. In this article, take a close look at the outline and be ready to follow up every week when new lessons are produced.<br \/>\n<ins style=\"display: block; text-align: center;\" data-ad-client=\"ca-pub-7041870931346451\" data-ad-format=\"fluid\" data-ad-layout=\"in-article\" data-ad-slot=\"8227894917\"><\/ins> <b>Course Outline<\/b><br \/>\n<b><\/b><\/p>\n<table style=\"height: 1000px;\" border=\"1\">\n<thead style=\"background-color: lightgrey;\">\n<tr>\n<td><strong>S#<\/strong><\/td>\n<td><strong>Topic<\/strong><\/td>\n<td><strong>Video<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>1<\/td>\n<td>Introduction to Ethical Hacking<\/td>\n<td><a href=\"http:\/\/#\" target=\"_blank\" rel=\"noopener\">Watch Video<\/a><\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td>Types of Hackers<\/td>\n<td>Watch Video<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td>Hacking Terms you Need to Know<\/td>\n<td>Watch Video<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td>Hacking Applications and Tools<\/td>\n<td>Watch Video<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td>Hacking Skills<\/td>\n<td>Watch Video<\/td>\n<\/tr>\n<tr>\n<td>6<\/td>\n<td>How to Plan a Hack<\/td>\n<td>Watch Video<\/td>\n<\/tr>\n<tr>\n<td>7<\/td>\n<td>Introduction to Email Hacking<\/td>\n<td>Watch Video<\/td>\n<\/tr>\n<tr>\n<td>8<\/td>\n<td>Introduction to Sniffing<\/td>\n<td>Watch Video<\/td>\n<\/tr>\n<tr>\n<td>9<\/td>\n<td>Hacking Wireless Networks<\/td>\n<td>Watch Video<\/td>\n<\/tr>\n<tr>\n<td>10<\/td>\n<td>More Hacking Tools and Techniques<\/td>\n<td>Watch Video<\/td>\n<\/tr>\n<tr>\n<td>11<\/td>\n<td>Introduction to Metasploit<\/td>\n<td>Watch Video<\/td>\n<\/tr>\n<tr>\n<td>12<\/td>\n<td>Introduction to Password Hacking<\/td>\n<td>Watch Video<\/td>\n<\/tr>\n<tr>\n<td>13<\/td>\n<td>Basics of Human Engineering<\/td>\n<td>Watch Video<\/td>\n<\/tr>\n<tr>\n<td>14<\/td>\n<td>Basics of SQL Injection<\/td>\n<td>Watch Video<\/td>\n<\/tr>\n<tr>\n<td>15<\/td>\n<td>Introduction to DNS Poisoning<\/td>\n<td>Watch Video<\/td>\n<\/tr>\n<tr>\n<td>16<\/td>\n<td>Introduction to DDOS<\/td>\n<td>Watch Video<\/td>\n<\/tr>\n<tr>\n<td>17<\/td>\n<td>Introduction to TCP\/IP<\/td>\n<td>Watch Video<\/td>\n<\/tr>\n<tr>\n<td>18<\/td>\n<td>Hacking Websites<\/td>\n<td>Watch Video<\/td>\n<\/tr>\n<tr>\n<td>19<\/td>\n<td>Introduction to Penetration Testing<\/td>\n<td>Watch Video<\/td>\n<\/tr>\n<tr>\n<td>20<\/td>\n<td>How to Protect Yourself from Hackers<\/td>\n<td>Watch Video<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><ins style=\"display: block; text-align: center;\" data-ad-client=\"ca-pub-7041870931346451\" data-ad-format=\"fluid\" data-ad-layout=\"in-article\" data-ad-slot=\"8227894917\"><\/ins> <b>About the Course Outline<\/b><br \/>\nJust to let you know that this course would let you have the requisite knowledge to be able to carry on your role as an ethical hacker. Note that\u00a0 a number of the topic are &#8216;Introduction to&#8230;&#8217; or &#8216;Basics of&#8230;&#8217;. This means that you are give a basic knowledge with some hands-on labs and necessary material needed to explore more.<\/p>\n<p>Let&#8217;s do this!<\/p>\n<p>Feel free to reach me by leaving a comment below or on the form somewhere on the left of this page.<br \/>\nAlso subscribe to <a href=\"https:\/\/www.youtube.com\/channel\/UCppSe7mf1kdxA3Ga49rPWBg\" target=\"_blank\" rel=\"noopener\">&#8220;The Tech Pro Channel on YouTube&#8221;<\/a> as we would be making video lessons as well.<br \/>\nYou could also join the <a href=\"https:\/\/www.facebook.com\/groups\/1447709731988533\/\" target=\"_blank\" rel=\"noopener\">International Computer Programmer&#8217;s group<\/a> if you use Facebook.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We in the International Computer Programmer&#8217;s group are happy to commence creating an Beginner Ethical Hacking Course for you! Every week we would publish a &hellip; <\/p>\n","protected":false},"author":2,"featured_media":481,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[583],"tags":[],"_links":{"self":[{"href":"https:\/\/kindsonthegenius.com\/blog\/wp-json\/wp\/v2\/posts\/35"}],"collection":[{"href":"https:\/\/kindsonthegenius.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kindsonthegenius.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kindsonthegenius.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/kindsonthegenius.com\/blog\/wp-json\/wp\/v2\/comments?post=35"}],"version-history":[{"count":3,"href":"https:\/\/kindsonthegenius.com\/blog\/wp-json\/wp\/v2\/posts\/35\/revisions"}],"predecessor-version":[{"id":482,"href":"https:\/\/kindsonthegenius.com\/blog\/wp-json\/wp\/v2\/posts\/35\/revisions\/482"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kindsonthegenius.com\/blog\/wp-json\/wp\/v2\/media\/481"}],"wp:attachment":[{"href":"https:\/\/kindsonthegenius.com\/blog\/wp-json\/wp\/v2\/media?parent=35"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kindsonthegenius.com\/blog\/wp-json\/wp\/v2\/categories?post=35"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kindsonthegenius.com\/blog\/wp-json\/wp\/v2\/tags?post=35"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}