WiFi King - LINK
Learn the secrets of how WiFi networks work and how to hack them, and additionally see how to do it using a mobile phone and NetHunter.
Kali Linux Ethical Hacking - Part 1 - LINK
This course is a practical introduction to Kali Linux, penetration testing, and hacking tools – from basic to advanced levels. With over 15 hours of recordings and 110 exercises, you'll learn ethical hacking from the inside out and build a solid foundation in cybersecurity.
Kali Linux Ethical Hacking - Part 2 - LINK
In this part of the course, you'll explore the advanced capabilities of Kali Linux – traffic tunneling, creating backdoors, password cracking, and remote system management. You'll also learn to use Metasploit and conduct professional penetration tests, developing your cybersecurity skills.
Kali Linux Ethical Hacking - Part 3 - LINK
In this part, you'll dive into Android hacking: installing backdoors, taking over files, SMS messages, camera, and microphone, and remotely eavesdropping on conversations. Additionally, you'll learn to work with Burp Suite and perform advanced web application penetration tests to effectively detect and exploit vulnerabilities.
Kali Linux Ethical Hacking - Part 4 - LINK
You will learn about vulnerability scanners and how to detect and analyze vulnerabilities, as well as conduct precise attacks—brute-force and Man-in-the-Middle. Additionally, you'll master Linux Hardening, port-forwarding, and system security practices to eliminate vulnerabilities and protect/manage devices outside the local network.
Understand UFW Firewall - From Scratch (Part 5) - LINK
This UFW course will show you practical ways to secure Linux systems—installing and configuring UFW, creating rules, and managing ports, IP addresses, and services. You'll also learn to defend servers against DoS and brute-force attacks, test rules, and build a solid foundation in network protection.
Nmap Course - Network Scanning from Basics to Hacking - LINK
In this course, you'll learn to use Nmap—from basics to advanced techniques: scanning, masking IP/MAC addresses, and using NSE scripts for service analysis and vulnerability detection. You'll also explore practical attacks (brute-force on SSH, DoS) and security methods, gaining essential tools for a pentester.
Metasploit Framework - From Zero to Hacker - LINK
A practical course showing the installation and configuration of the environment, working with msfconsole, exploits, payloads, and auxiliary modules. You'll learn to create and manage backdoors with Meterpreter, escalate privileges, build payloads in msfvenom, and hide activity during penetration tests.
Kali Linux: TCPDump in a Nutshell – Take Over and Eavesdrop on the Network - LINK
A compact course on network sniffing—capturing traffic, logs, and passwords (FTP/Telnet/HTTP), building evidence, and analyzing packets using BPF and TCP stream. Includes practical exercises on Metasploitable2, payload extraction, automatic brute-force detection, and Python tools to facilitate work.
Security Starter - LINK
Learn 5 basic areas in IT and cybersecurity
-Networks
-SQL
-Linux
-Windows
-Security Basics
Web Application Security Testing Masters - LINK
Go through the entire process of conducting a web application penetration test: from setting up the environment, through detecting security vulnerabilities, to the final report.
