Learn slowly to understand each attacks.
1. Course Introduction
2. Creating our lab
3. Terminologies
4. Kali Linux in Virtual Box
5. bootable kali linux in USB
6. Learn to compile languages
7. Server and Client concept
8. Creating your first php program
9. Burpsuite Intro
10. xss dom
11. xss reflected
12. xss stored
13. xss + beef = android
14. beef redirection
15. beef windows password
16. wifi - insider
17. wep with aircrack ng
18. wpa with aircrack ng
19. wpa with fern cracker
20. f@ke @ccessp0int
21. Mysql Basics
22. sql injection automated
23. sql injection basics
24. SQL injection step bystep
25. csrf
26. P@ssw0rd Cr@cking Ide@s
27. brutef0rce
28. nmap
29. zenmap
30. info gathering ip scanner
31. info gathering browser tools
32. information gathering website
33. website recon
34. humenerr0r (ph)fishing
35. s0cial medi@ passw0rds
36. Android phone takeover
37. windows system takeover
38. cain and able
39. sniffing
40. d0s- basic windows aftermath
41. d0s- website service
42. information gathering email
43. person info gathering tools
44. ngr installation in kali
45. Lurk!ng a person
46. reverse-engineering
47. Def@cing @ website
48. Command injection @ttack
49. cryptogr@phy
50. steganogr@phy
51. An0nymizing y0ur computer