Modules / Lectures

Video Transcript:

Auto Scroll Hide
Module NameDownload
Week_01_Assignment_01Week_01_Assignment_01
Week_02_Assignment_02Week_02_Assignment_02
Week_03_Assignment_03Week_03_Assignment_03
Week_04_Assignment_04Week_04_Assignment_04
Week_05_Assignment_05Week_05_Assignment_05
Week_06_Assignment_06Week_06_Assignment_06
Week_07_Assignment_07Week_07_Assignment_07
Week_08_Assignment_08Week_08_Assignment_08
Week_09_Assignment_09Week_09_Assignment_09
Week_10_Assignment_10Week_10_Assignment_10
Week_11_Assignment_11Week_11_Assignment_11
Week_12_Assignment_12Week_12_Assignment_12


Sl.No Chapter Name MP4 Download
1Lecture 01: Introduction to Ethical HackingDownload
2Lecture 02: Basic Concepts of Networking (part-I)Download
3Lecture 03:Basic Concepts of Networking (part-II)Download
4Lecture 04: TCP/IP Protocol Stack (part-I)Download
5Lecture 05: TCP/IP Protocol Stack (Part-II)Download
6Lecture 06: IP addressing and routing (Part I)Download
7Lecture 07: IP addressing and routing (Part II)Download
8Lecture 08: TCP and UDP (Part I)Download
9Lecture 09: TCP and UDP (Part II)Download
10Lecture 10: IP subnettingDownload
11Lecture 11: Routing protocols (Part I)Download
12Lecture 12: Routing protocols (Part II)Download
13Lecture 13: Routing protocols (Part III)Download
14Lecture 14: IP version 6Download
15Lecture 15: Routing examplesDownload
16Lecture 16: "Software Installation and Network Setup"Download
17Lecture 17: Information Gathering (Part 1)Download
18Lecture 18: Information Gathering (Part 2)Download
19Lecture 19: Port Scanning Using NMAPDownload
20Lecture 20: Other Features of NMAPDownload
21Lecture 21: Metasploit Exploiting System Software - IDownload
22Lecture 22: Metasploit Exploiting System Software - IIDownload
23Lecture 23: Metasploit Exploiting System Software and PrivilegeDownload
24Lecture 24: Metasploit Social Eng AttackDownload
25Lecture 25: MITM (Man in The middle)AttackDownload
26Lecture 26: Basic concepts of cryptographyDownload
27Lecture 27: Private-key cryptography (Part I)Download
28Lecture 28: Private-key cryptography (Part II)Download
29Lecture 29: Public-key cryptography (Part I)Download
30Lecture 30: Public-key cryptography (Part II)Download
31Lecture 31: Cryptographic hash functions (Part I)Download
32Lecture 32: Cryptographic hash functions (Part II)Download
33Lecture 33: Digital signature and certificateDownload
34Lecture 34: Applications (Part I)Download
35Lecture 35: Applications (Part II)Download
36Lecture 36: SteganographyDownload
37Lecture 37: BiometricsDownload
38Lecture 38: Network Based Attacks (Part I)Download
39Lecture 39: Network Based Attacks (Part II)Download
40Lecture 40: DNS and Email SecurityDownload
41Lecture 41: Password crackingDownload
42Lecture 42: Phishing attackDownload
43Lecture 43: MaloewareDownload
44Lecture 44: Wifi hackingDownload
45Lecture 45: Dos and DDos attackDownload
46Lecture 46: Elements of Hardware SecurityDownload
47Lecture 47: Side Channel Attacks (Part I)Download
48Lecture 48: Side Channel Attacks (Part II)Download
49Lecture 49: Physical Unclonable FunctionDownload
50Lecture 50: Hardware TrojanDownload
51Lecture 51 : Web Application Vulnerability ScanningDownload
52Lecture 52 : Part 1 : SQL Injection Authentication BypassDownload
53Lecture 52 : Part 2: SQL Injection Error BasedDownload
54Lecture 52 : Part 3 : SQL Injection Error Based from Web ApplicationDownload
55Lecture 53 : SQLMAPDownload
56Lecture 54 : Cross Site ScriptingDownload
57Lecture 55 : File Upload VulnerabilityDownload
58Lecture 56 : The NMAP Tool: A Relook (Part I)Download
59Lecture 57 : The NMAP Tool: A Relook (Part II)Download
60Lecture 58 : The NMAP Tool: A Relook (Part III)Download
61Lecture 59 : Network Analysis using WiresharkDownload
62Lecture 60 : Summarization of the CourseDownload

Sl.No Chapter Name English
1Lecture 01: Introduction to Ethical HackingDownload
Verified
2Lecture 02: Basic Concepts of Networking (part-I)Download
Verified
3Lecture 03:Basic Concepts of Networking (part-II)Download
Verified
4Lecture 04: TCP/IP Protocol Stack (part-I)Download
Verified
5Lecture 05: TCP/IP Protocol Stack (Part-II)Download
Verified
6Lecture 06: IP addressing and routing (Part I)Download
Verified
7Lecture 07: IP addressing and routing (Part II)Download
Verified
8Lecture 08: TCP and UDP (Part I)Download
Verified
9Lecture 09: TCP and UDP (Part II)Download
Verified
10Lecture 10: IP subnettingDownload
Verified
11Lecture 11: Routing protocols (Part I)Download
Verified
12Lecture 12: Routing protocols (Part II)Download
Verified
13Lecture 13: Routing protocols (Part III)Download
Verified
14Lecture 14: IP version 6Download
Verified
15Lecture 15: Routing examplesDownload
Verified
16Lecture 16: "Software Installation and Network Setup"Download
Verified
17Lecture 17: Information Gathering (Part 1)Download
Verified
18Lecture 18: Information Gathering (Part 2)Download
Verified
19Lecture 19: Port Scanning Using NMAPDownload
Verified
20Lecture 20: Other Features of NMAPDownload
Verified
21Lecture 21: Metasploit Exploiting System Software - IDownload
Verified
22Lecture 22: Metasploit Exploiting System Software - IIDownload
Verified
23Lecture 23: Metasploit Exploiting System Software and PrivilegeDownload
Verified
24Lecture 24: Metasploit Social Eng AttackDownload
Verified
25Lecture 25: MITM (Man in The middle)AttackDownload
Verified
26Lecture 26: Basic concepts of cryptographyDownload
Verified
27Lecture 27: Private-key cryptography (Part I)Download
Verified
28Lecture 28: Private-key cryptography (Part II)Download
Verified
29Lecture 29: Public-key cryptography (Part I)Download
Verified
30Lecture 30: Public-key cryptography (Part II)Download
Verified
31Lecture 31: Cryptographic hash functions (Part I)Download
Verified
32Lecture 32: Cryptographic hash functions (Part II)Download
Verified
33Lecture 33: Digital signature and certificateDownload
Verified
34Lecture 34: Applications (Part I)Download
Verified
35Lecture 35: Applications (Part II)Download
Verified
36Lecture 36: SteganographyDownload
Verified
37Lecture 37: BiometricsDownload
Verified
38Lecture 38: Network Based Attacks (Part I)Download
Verified
39Lecture 39: Network Based Attacks (Part II)Download
Verified
40Lecture 40: DNS and Email SecurityDownload
Verified
41Lecture 41: Password crackingDownload
Verified
42Lecture 42: Phishing attackDownload
Verified
43Lecture 43: MaloewareDownload
Verified
44Lecture 44: Wifi hackingDownload
Verified
45Lecture 45: Dos and DDos attackDownload
Verified
46Lecture 46: Elements of Hardware SecurityDownload
Verified
47Lecture 47: Side Channel Attacks (Part I)Download
Verified
48Lecture 48: Side Channel Attacks (Part II)Download
Verified
49Lecture 49: Physical Unclonable FunctionDownload
Verified
50Lecture 50: Hardware TrojanDownload
Verified
51Lecture 51 : Web Application Vulnerability ScanningDownload
Verified
52Lecture 52 : Part 1 : SQL Injection Authentication BypassDownload
Verified
53Lecture 52 : Part 2: SQL Injection Error BasedDownload
Verified
54Lecture 52 : Part 3 : SQL Injection Error Based from Web ApplicationDownload
Verified
55Lecture 53 : SQLMAPDownload
Verified
56Lecture 54 : Cross Site ScriptingDownload
Verified
57Lecture 55 : File Upload VulnerabilityDownload
Verified
58Lecture 56 : The NMAP Tool: A Relook (Part I)Download
Verified
59Lecture 57 : The NMAP Tool: A Relook (Part II)Download
Verified
60Lecture 58 : The NMAP Tool: A Relook (Part III)Download
Verified
61Lecture 59 : Network Analysis using WiresharkDownload
Verified
62Lecture 60 : Summarization of the CourseDownload
Verified


Sl.No Language Book link
1EnglishDownload
2BengaliNot Available
3GujaratiNot Available
4HindiNot Available
5KannadaNot Available
6MalayalamNot Available
7MarathiNot Available
8TamilNot Available
9TeluguNot Available