Module Name | Download |
---|---|
Week_01_Assignment_01 | Week_01_Assignment_01 |
Week_02_Assignment_02 | Week_02_Assignment_02 |
Week_03_Assignment_03 | Week_03_Assignment_03 |
Week_04_Assignment_04 | Week_04_Assignment_04 |
Week_05_Assignment_05 | Week_05_Assignment_05 |
Week_06_Assignment_06 | Week_06_Assignment_06 |
Week_07_Assignment_07 | Week_07_Assignment_07 |
Week_08_Assignment_08 | Week_08_Assignment_08 |
Week_09_Assignment_09 | Week_09_Assignment_09 |
Week_10_Assignment_10 | Week_10_Assignment_10 |
Week_11_Assignment_11 | Week_11_Assignment_11 |
Week_12_Assignment_12 | Week_12_Assignment_12 |
Sl.No | Chapter Name | MP4 Download |
---|---|---|
1 | Lecture 01: Introduction to Ethical Hacking | Download |
2 | Lecture 02: Basic Concepts of Networking (part-I) | Download |
3 | Lecture 03:Basic Concepts of Networking (part-II) | Download |
4 | Lecture 04: TCP/IP Protocol Stack (part-I) | Download |
5 | Lecture 05: TCP/IP Protocol Stack (Part-II) | Download |
6 | Lecture 06: IP addressing and routing (Part I) | Download |
7 | Lecture 07: IP addressing and routing (Part II) | Download |
8 | Lecture 08: TCP and UDP (Part I) | Download |
9 | Lecture 09: TCP and UDP (Part II) | Download |
10 | Lecture 10: IP subnetting | Download |
11 | Lecture 11: Routing protocols (Part I) | Download |
12 | Lecture 12: Routing protocols (Part II) | Download |
13 | Lecture 13: Routing protocols (Part III) | Download |
14 | Lecture 14: IP version 6 | Download |
15 | Lecture 15: Routing examples | Download |
16 | Lecture 16: "Software Installation and Network Setup" | Download |
17 | Lecture 17: Information Gathering (Part 1) | Download |
18 | Lecture 18: Information Gathering (Part 2) | Download |
19 | Lecture 19: Port Scanning Using NMAP | Download |
20 | Lecture 20: Other Features of NMAP | Download |
21 | Lecture 21: Metasploit Exploiting System Software - I | Download |
22 | Lecture 22: Metasploit Exploiting System Software - II | Download |
23 | Lecture 23: Metasploit Exploiting System Software and Privilege | Download |
24 | Lecture 24: Metasploit Social Eng Attack | Download |
25 | Lecture 25: MITM (Man in The middle)Attack | Download |
26 | Lecture 26: Basic concepts of cryptography | Download |
27 | Lecture 27: Private-key cryptography (Part I) | Download |
28 | Lecture 28: Private-key cryptography (Part II) | Download |
29 | Lecture 29: Public-key cryptography (Part I) | Download |
30 | Lecture 30: Public-key cryptography (Part II) | Download |
31 | Lecture 31: Cryptographic hash functions (Part I) | Download |
32 | Lecture 32: Cryptographic hash functions (Part II) | Download |
33 | Lecture 33: Digital signature and certificate | Download |
34 | Lecture 34: Applications (Part I) | Download |
35 | Lecture 35: Applications (Part II) | Download |
36 | Lecture 36: Steganography | Download |
37 | Lecture 37: Biometrics | Download |
38 | Lecture 38: Network Based Attacks (Part I) | Download |
39 | Lecture 39: Network Based Attacks (Part II) | Download |
40 | Lecture 40: DNS and Email Security | Download |
41 | Lecture 41: Password cracking | Download |
42 | Lecture 42: Phishing attack | Download |
43 | Lecture 43: Maloeware | Download |
44 | Lecture 44: Wifi hacking | Download |
45 | Lecture 45: Dos and DDos attack | Download |
46 | Lecture 46: Elements of Hardware Security | Download |
47 | Lecture 47: Side Channel Attacks (Part I) | Download |
48 | Lecture 48: Side Channel Attacks (Part II) | Download |
49 | Lecture 49: Physical Unclonable Function | Download |
50 | Lecture 50: Hardware Trojan | Download |
51 | Lecture 51 : Web Application Vulnerability Scanning | Download |
52 | Lecture 52 : Part 1 : SQL Injection Authentication Bypass | Download |
53 | Lecture 52 : Part 2: SQL Injection Error Based | Download |
54 | Lecture 52 : Part 3 : SQL Injection Error Based from Web Application | Download |
55 | Lecture 53 : SQLMAP | Download |
56 | Lecture 54 : Cross Site Scripting | Download |
57 | Lecture 55 : File Upload Vulnerability | Download |
58 | Lecture 56 : The NMAP Tool: A Relook (Part I) | Download |
59 | Lecture 57 : The NMAP Tool: A Relook (Part II) | Download |
60 | Lecture 58 : The NMAP Tool: A Relook (Part III) | Download |
61 | Lecture 59 : Network Analysis using Wireshark | Download |
62 | Lecture 60 : Summarization of the Course | Download |
Sl.No | Chapter Name | English |
---|---|---|
1 | Lecture 01: Introduction to Ethical Hacking | Download Verified |
2 | Lecture 02: Basic Concepts of Networking (part-I) | Download Verified |
3 | Lecture 03:Basic Concepts of Networking (part-II) | Download Verified |
4 | Lecture 04: TCP/IP Protocol Stack (part-I) | Download Verified |
5 | Lecture 05: TCP/IP Protocol Stack (Part-II) | Download Verified |
6 | Lecture 06: IP addressing and routing (Part I) | Download Verified |
7 | Lecture 07: IP addressing and routing (Part II) | Download Verified |
8 | Lecture 08: TCP and UDP (Part I) | Download Verified |
9 | Lecture 09: TCP and UDP (Part II) | Download Verified |
10 | Lecture 10: IP subnetting | Download Verified |
11 | Lecture 11: Routing protocols (Part I) | Download Verified |
12 | Lecture 12: Routing protocols (Part II) | Download Verified |
13 | Lecture 13: Routing protocols (Part III) | Download Verified |
14 | Lecture 14: IP version 6 | Download Verified |
15 | Lecture 15: Routing examples | Download Verified |
16 | Lecture 16: "Software Installation and Network Setup" | Download Verified |
17 | Lecture 17: Information Gathering (Part 1) | Download Verified |
18 | Lecture 18: Information Gathering (Part 2) | Download Verified |
19 | Lecture 19: Port Scanning Using NMAP | Download Verified |
20 | Lecture 20: Other Features of NMAP | Download Verified |
21 | Lecture 21: Metasploit Exploiting System Software - I | Download Verified |
22 | Lecture 22: Metasploit Exploiting System Software - II | Download Verified |
23 | Lecture 23: Metasploit Exploiting System Software and Privilege | Download Verified |
24 | Lecture 24: Metasploit Social Eng Attack | Download Verified |
25 | Lecture 25: MITM (Man in The middle)Attack | Download Verified |
26 | Lecture 26: Basic concepts of cryptography | Download Verified |
27 | Lecture 27: Private-key cryptography (Part I) | Download Verified |
28 | Lecture 28: Private-key cryptography (Part II) | Download Verified |
29 | Lecture 29: Public-key cryptography (Part I) | Download Verified |
30 | Lecture 30: Public-key cryptography (Part II) | Download Verified |
31 | Lecture 31: Cryptographic hash functions (Part I) | Download Verified |
32 | Lecture 32: Cryptographic hash functions (Part II) | Download Verified |
33 | Lecture 33: Digital signature and certificate | Download Verified |
34 | Lecture 34: Applications (Part I) | Download Verified |
35 | Lecture 35: Applications (Part II) | Download Verified |
36 | Lecture 36: Steganography | Download Verified |
37 | Lecture 37: Biometrics | Download Verified |
38 | Lecture 38: Network Based Attacks (Part I) | Download Verified |
39 | Lecture 39: Network Based Attacks (Part II) | Download Verified |
40 | Lecture 40: DNS and Email Security | Download Verified |
41 | Lecture 41: Password cracking | Download Verified |
42 | Lecture 42: Phishing attack | Download Verified |
43 | Lecture 43: Maloeware | Download Verified |
44 | Lecture 44: Wifi hacking | Download Verified |
45 | Lecture 45: Dos and DDos attack | Download Verified |
46 | Lecture 46: Elements of Hardware Security | Download Verified |
47 | Lecture 47: Side Channel Attacks (Part I) | Download Verified |
48 | Lecture 48: Side Channel Attacks (Part II) | Download Verified |
49 | Lecture 49: Physical Unclonable Function | Download Verified |
50 | Lecture 50: Hardware Trojan | Download Verified |
51 | Lecture 51 : Web Application Vulnerability Scanning | Download Verified |
52 | Lecture 52 : Part 1 : SQL Injection Authentication Bypass | Download Verified |
53 | Lecture 52 : Part 2: SQL Injection Error Based | Download Verified |
54 | Lecture 52 : Part 3 : SQL Injection Error Based from Web Application | Download Verified |
55 | Lecture 53 : SQLMAP | Download Verified |
56 | Lecture 54 : Cross Site Scripting | Download Verified |
57 | Lecture 55 : File Upload Vulnerability | Download Verified |
58 | Lecture 56 : The NMAP Tool: A Relook (Part I) | Download Verified |
59 | Lecture 57 : The NMAP Tool: A Relook (Part II) | Download Verified |
60 | Lecture 58 : The NMAP Tool: A Relook (Part III) | Download Verified |
61 | Lecture 59 : Network Analysis using Wireshark | Download Verified |
62 | Lecture 60 : Summarization of the Course | Download Verified |
Sl.No | Language | Book link |
---|---|---|
1 | English | Download |
2 | Bengali | Not Available |
3 | Gujarati | Not Available |
4 | Hindi | Not Available |
5 | Kannada | Not Available |
6 | Malayalam | Not Available |
7 | Marathi | Not Available |
8 | Tamil | Not Available |
9 | Telugu | Not Available |