Modules / Lectures
Module NameDownload

Sl.No Chapter Name MP4 Download Transcript Download
1Lecture 01: Introduction to Ethical HackingDownloadDownload
To be verified
2Lecture 02: Basic Concepts of Networking (part-I)DownloadDownload
To be verified
3Lecture 03:Basic Concepts of Networking (part-II)DownloadDownload
To be verified
4Lecture 04: TCP/IP Protocol Stack (part-I)DownloadDownload
To be verified
5Lecture 05: TCP/IP Protocol Stack (Part-II)DownloadDownload
To be verified
6Lecture 06: IP addressing and routing (Part I)DownloadPDF unavailable
7Lecture 07: IP addressing and routing (Part II)DownloadPDF unavailable
8Lecture 08: TCP and UDP (Part I)DownloadPDF unavailable
9Lecture 09: TCP and UDP (Part II)DownloadPDF unavailable
10Lecture 10: IP subnettingDownloadPDF unavailable
11Lecture 11: Routing protocols (Part I)DownloadPDF unavailable
12Lecture 12: Routing protocols (Part II)DownloadPDF unavailable
13Lecture 13: Routing protocols (Part III)DownloadPDF unavailable
14Lecture 14: IP version 6DownloadPDF unavailable
15Lecture 15: Routing examplesDownloadPDF unavailable
16Lecture 16: Demonstration Part IDownloadPDF unavailable
17Lecture 17: Demonstration Part IIDownloadPDF unavailable
18Lecture 18: Demonstration Part IIIDownloadPDF unavailable
19Lecture 19: Nessus InstallationDownloadPDF unavailable
20Lecture 20: How to use nessusDownloadPDF unavailable
21Lecture 21: Metasploit Exploiting System Software - IDownloadPDF unavailable
22Lecture 22: Metasploit Exploiting System Software - IIDownloadPDF unavailable
23Lecture 23: Metasploit Exploiting System Software and PrivilegeDownloadPDF unavailable
24Lecture 24: Metasploit Social Eng AttackDownloadPDF unavailable
25Lecture 25: MITM (Man in The middle)AttackDownloadPDF unavailable
26Lecture 26: Basic concepts of cryptographyDownloadPDF unavailable
27Lecture 27: Private-key cryptography (Part I)DownloadPDF unavailable
28Lecture 28: Private-key cryptography (Part II)DownloadPDF unavailable
29Lecture 29: Public-key cryptography (Part I)DownloadPDF unavailable
30Lecture 30: Public-key cryptography (Part II)DownloadPDF unavailable
31Lecture 31: Cryptographic hash functions (Part I)DownloadPDF unavailable
32Lecture 32: Cryptographic hash functions (Part II)DownloadPDF unavailable
33Lecture 33: Digital signature and certificateDownloadPDF unavailable
34Lecture 34: Applications (Part I)DownloadPDF unavailable
35Lecture 35: Applications (Part II)DownloadPDF unavailable
36Lecture 36: SteganographyDownloadPDF unavailable
37Lecture 37: BiometricsDownloadPDF unavailable
38Lecture 38: Network Based Attacks (Part I)DownloadPDF unavailable
39Lecture 39: Network Based Attacks (Part II)DownloadPDF unavailable
40Lecture 40: DNS and Email SecurityDownloadPDF unavailable