1. Open Source v/s Closed Source
2. What is Linux and Linux Kernel?
Linux and Linux Kernel
3. About Kali Linux and its Specifications
4. Install Kali Linux & Virtualization Technology
Install Kali Linux & Virtualization
5. Basic Understanding of Linux
6. Troubleshoot Issues of Kali Linux Old Versions
7. Useful Commands
Useful Command Part 2
Useful Commands Part 3
Useful Commands Part 4
Useful Commands Part 5
8. Analysis of Is Command
9. Analysis of cd Command
10. Helping Yourself and Getting Help in Kali Linux
Helping Yourself and Getting Help in Kali Linux
11. Configuration Files in Kali Linux
12. Passwd File Analysis
13. Symbols in Kali Linux
14. Permissions in Linux
Permissions Overview
How to Check
Symbolic Permission
Numerical Permission
Default Permission Part 1
Default Permission Part 2
15. Managing Network in Kali Linux
Managing Networks Part 1
Managing Networks Part 2
Managing Networks Part 3
Managing Networks Part 4
Managing Networks Part 5
Managing Networks Part 6
16. Whois
Whois Info
17. Hydra
Hydra Part 1
Hydra Part 2
Hydra Part 3
18. NMAP – Network Mapper
Nmap Part 1
Nmap Part 2
Nmap Part 3
Nmap Part 4
Nmap Part 5
Nmap Part 6
Nmap Part 7
19. Sqlmap and How to Hack Website Database with the help of Sqlmap
1.Login Page Bypass
2.Mannual SQL Injection
3.SQL Injection Automate
20. Metasploit Framework
Metasploit Part 1
Metasploit Part 2
Metasploit Part 3
21. Burpsuite for Beginners
Burpsuite Part 1
Burpsuite Part 2
Burpsuite Part 3
22. Understanding of Wireshark
Wireshark Part 1
Wireshark Part 2
Wireshark Part 3
Wireshark Part 4
Wireshark Part 5
Wireshark Part 6
23. Bonus !!!
How to Become a Successful Ethical Hacker
Q/A
Symbols in Linux