Ethical Hacking Full Course for Beginners to Pro in 3 Hours [Part-2] 🔥 - 2024 Edition

preview_player
Показать описание
Ethical Hacking Full Course for Beginners to Pro in 3 Hours [Part-2] 🔥 - 2024 Edition

WsCube Tech is a Vernacular Upskilling platform revolutionizing the way you learn and develop your career skills.🚀

WsCube Tech stands out as a leading EdTech platform, offering comprehensive education in Ethical Hacking, Penetration Testing, and various cybersecurity skills. Our approach involves both online and classroom training, featuring hands-on projects delivered practically by seasoned industry experts.

With WsCube Tech, you'll gain hands-on skills that make you globally competitive. Our courses are designed to prepare over 100 million career aspirants for the 'Bharat' of the future. 😊

Timestamps:
00:00:00 - Ethical Hacking Course Part-2 Introduction.
00:01:22 - Learn about different network topologies.
00:11:13 - Understand the components involved in networking.
00:15:18 - Explore the OSI and TCP/IP networking models.
00:27:18 - Discover how IP addresses are assigned to systems.
00:40:20 - Learn about the compression of IPv6 addresses.
00:45:36 - Understand the EU1-64 format for IPv6 addresses.
00:50:35 - Learn the process of assigning IPv6 addresses.
00:55:32 - Explore IPv6 address tunneling methods.
00:58:48 - Understand the Neighbor Discovery Protocol in IPv6.
01:03:08 - Learn about the Address Resolution Protocol packet format.
01:07:29 - Understand the format of TCP packet headers.
01:12:54 - Explore the format of ICMP packets.
01:17:21 - Understand the format of DNS packets.
01:23:45 - Learn about the format of UDP packets.
01:26:47 - Gain insights into computer network defense strategies.
01:34:44 - Explore the elements involved in computer network defense.
01:40:18 - Understand the process of computer network defense.
01:44:47 - Learn about the functioning of firewalls.
01:53:51 - Set up a lab environment with Windows 7 in VMware.
01:56:24 - Set up pfSense in VMware for lab purposes.
02:02:32 - Learn how to install MacOS Big Sur in Virtualbox.
02:16:06 - Explore networking and troubleshooting commands in Windows.
02:25:58 - Continued exploration of networking and troubleshooting commands in Windows.
02:33:48 - Learn about essential programs for Windows.
02:39:30 - Understand how to configure the Windows host firewall.
02:51:17 - Configure the Windows host firewall using the WFC graphical user interface.
02:58:10 - Explore third-party firewall options for Windows.
03:01:43 - Learn how to configure the firewall on a Linux host.
03:18:04 - Configure the firewall for IPv6 on a Linux host.
03:23:17 - Explore the Uncomplicated Firewall (UFW) on Linux hosts.
03:28:48 - Understand Web Application Firewall (WAF) ModSecurity on Linux.
03:35:25 - Explore WAF ModSecurity with OWASP rules on Linux.
03:43:42 - Learn how to configure the firewall on a Mac host.
03:47:15 - Further insights into configuring the firewall on a Mac host.

For any queries, call us on: +91-8561089567

🔴 Disclaimer 🔴
This video is made available for educational and informational purposes only. We believe that everyone must be aware of ethical hacking and cybersecurity to avoid different types of cyberattacks on computers, websites, apps, etc. Please regard the word hacking as ethical hacking every time we use it.
All our videos have been made using our own systems, servers, routers, and websites. It does not contain any illegal activities. Our sole purpose is to raise awareness related to cybersecurity and help our viewers learn ways to defend themselves from any hacking activities. WsCube Tech is not responsible for any misuse of the provided information.

✅ CONNECT WITH THE FOUNDER (Mr. Kushagra Bhatia) -

Connect with WsCube Tech on social media for the latest offers, promos, job vacancies, and much more:
--------------------------------------| Thanks |---------------------------
#ethicalhacking #ethicalhackingcourse #hackingcourse
Рекомендации по теме
Комментарии
Автор

ASHISH SIR I DONT KNOW MERA COMMENT AAPKO MILA YA NAHI LEKIN SIR AGAR AAPKO MILA HAI TO PLEASE MUJHKO AAPKI BUG BOUNTY KI VIDEO JO IS CHANNEL PAR UPLOAD THI WO AAPNE HATA DI HAI SIR MERE LIYE AAP MERI INSIPIRATION HO PLEASE SIR MUJHKO WO VIDEO CHAHIYE PLEASE MUST ASHISH SIR HELP

AASHUTHEPARANORMAL
Автор

Part 1 to 5hr ki video ko pura samjh kar dhekha maine 10 din lagakar.. Thank you so much for your part 2 video 🎉🎉🎉❤❤❤❤❤ waiting from 1 mnts 😢😢 love you Sir .. salute

yxpfcbn
Автор

Very exited sir..
Finally aa hi gaya 😊
But,
Jitna topic expect kiya tha .
Utna nahi hai 😢

LeptopOperator
Автор

Sir I subscribed your channel 3 time.
Please make also part - 3...

pcb
Автор

Ashish sir and Ankur sir so good teach

ayansheikh
Автор

sir payload ko doucument or image me kese bind kare , ,,, kisi ko pata ho to batavo

mayanktiwari
Автор

Thank you for the part 2. Now we are waiting for the part 3

alexbasar
Автор

Apka yeah video sach mey bahoot kaam ka hai

_rs_unique_
Автор

Hii mam and sir I am form odisha mayurbhanj


Jay Jagannath ⭕‼️⭕

Mithlesskumar
Автор

Hello, i have watched part-1 and very very liked it this informative content and i am watching part-2 and i will complete this in june's starting. So, please upload part 3, my excitement gets overloaded for part 3. Also after watching/learning basics i want to enroll in advance course of cyber security.
Thanks

Mayank
Автор

Thank you so much I was waiting for this.

dramatic_world
Автор

Sir big fan 🎉🎉

Sir next hacking video jaldi lana please sir ❤😂🎉

VISHALGAMEINGYT
Автор

Sir mujhe bohot sare videos nahi mila please link send me

jtqulpv
Автор

Sir ethical hacking k course mai Pakistan se enroll ho skte hai??

dwjtteg
Автор

Sir in ipv6 changing You changed that formet right ? but BC --> converted to ( 8e ) i understand C is replaced by E but . How that B is replaced by 8 ? @WsCubeCyberSecurity

Neelbhatt
Автор

Sir me kisi ka Facebook id hack keise karu please boldo 😢😢😢😢😢

bachanroy
Автор

Great to see you back sir❤❤❤❤love from Kolkata

shubhajitmallick
Автор

not as your first part was awesome but u didn't explain everything in detail in this part

shiva_
Автор

After completing Part 1 and part 2, where to i stand in ethical hacking.. Beginner, intermidiate or advanced?

haristechjourney
Автор

Sir please mujhe apka all videos ka link send kar do

jtqulpv