Modules / Lectures
Module NameDownload
Week_01_Assignment_01Week_01_Assignment_01
Week_02_Assignment_02Week_02_Assignment_02
Week_03_Assignment_03Week_03_Assignment_03
Week_04_Assignment_04Week_04_Assignment_04
Week_05_Assignment_05Week_05_Assignment_05
Week_06_Assignment_06Week_06_Assignment_06
Week_07_Assignment_07Week_07_Assignment_07
Week_08_Assignment_08Week_08_Assignment_08
Week_09_Assignment_09Week_09_Assignment_09
Week_10_Assignment_10Week_10_Assignment_10
Week_11_Assignment_11Week_11_Assignment_11
Week_12_Assignment_12Week_12_Assignment_12


Sl.No Chapter Name MP4 Download Transcript Download
1Lecture 01: Introduction to Ethical HackingDownloadDownload
Verified
2Lecture 02: Basic Concepts of Networking (part-I)DownloadDownload
Verified
3Lecture 03:Basic Concepts of Networking (part-II)DownloadDownload
Verified
4Lecture 04: TCP/IP Protocol Stack (part-I)DownloadDownload
Verified
5Lecture 05: TCP/IP Protocol Stack (Part-II)DownloadDownload
Verified
6Lecture 06: IP addressing and routing (Part I)DownloadDownload
Verified
7Lecture 07: IP addressing and routing (Part II)DownloadDownload
Verified
8Lecture 08: TCP and UDP (Part I)DownloadDownload
Verified
9Lecture 09: TCP and UDP (Part II)DownloadDownload
Verified
10Lecture 10: IP subnettingDownloadDownload
Verified
11Lecture 11: Routing protocols (Part I)DownloadDownload
Verified
12Lecture 12: Routing protocols (Part II)DownloadDownload
Verified
13Lecture 13: Routing protocols (Part III)DownloadDownload
Verified
14Lecture 14: IP version 6DownloadDownload
Verified
15Lecture 15: Routing examplesDownloadDownload
Verified
16Lecture 16: Demonstration Part IDownloadDownload
Verified
17Lecture 17: Demonstration Part IIDownloadDownload
Verified
18Lecture 18: Demonstration Part IIIDownloadDownload
Verified
19Lecture 19: Nessus InstallationDownloadDownload
Verified
20Lecture 20: How to use nessusDownloadDownload
Verified
21Lecture 21: Metasploit Exploiting System Software - IDownloadDownload
Verified
22Lecture 22: Metasploit Exploiting System Software - IIDownloadDownload
Verified
23Lecture 23: Metasploit Exploiting System Software and PrivilegeDownloadDownload
Verified
24Lecture 24: Metasploit Social Eng AttackDownloadDownload
Verified
25Lecture 25: MITM (Man in The middle)AttackDownloadDownload
Verified
26Lecture 26: Basic concepts of cryptographyDownloadDownload
Verified
27Lecture 27: Private-key cryptography (Part I)DownloadDownload
Verified
28Lecture 28: Private-key cryptography (Part II)DownloadDownload
Verified
29Lecture 29: Public-key cryptography (Part I)DownloadDownload
Verified
30Lecture 30: Public-key cryptography (Part II)DownloadDownload
Verified
31Lecture 31: Cryptographic hash functions (Part I)DownloadDownload
Verified
32Lecture 32: Cryptographic hash functions (Part II)DownloadDownload
Verified
33Lecture 33: Digital signature and certificateDownloadDownload
Verified
34Lecture 34: Applications (Part I)DownloadDownload
Verified
35Lecture 35: Applications (Part II)DownloadDownload
Verified
36Lecture 36: SteganographyDownloadDownload
Verified
37Lecture 37: BiometricsDownloadDownload
Verified
38Lecture 38: Network Based Attacks (Part I)DownloadDownload
Verified
39Lecture 39: Network Based Attacks (Part II)DownloadDownload
Verified
40Lecture 40: DNS and Email SecurityDownloadDownload
Verified
41Lecture 41: Password crackingDownloadDownload
Verified
42Lecture 42: Phishing attackDownloadDownload
Verified
43Lecture 43: MaloewareDownloadDownload
Verified
44Lecture 44: Wifi hackingDownloadDownload
Verified
45Lecture 45: Dos and DDos attackDownloadDownload
Verified
46Lecture 46: Elements of Hardware SecurityDownloadPDF unavailable
47Lecture 47: Side Channel Attacks (Part I)DownloadPDF unavailable
48Lecture 48: Side Channel Attacks (Part II)DownloadPDF unavailable
49Lecture 49: Physical Unclonable FunctionDownloadPDF unavailable
50Lecture 50: Hardware TrojanDownloadPDF unavailable
51Lecture 51 : Web Application Vulnerability ScanningDownloadPDF unavailable
52Lecture 52 : Part 1 : SQL Injection Authentication BypassDownloadPDF unavailable
53Lecture 52 : Part 2: SQL Injection Error BasedDownloadPDF unavailable
54Lecture 52 : Part 3 : SQL Injection Error Based from Web ApplicationDownloadPDF unavailable
55Lecture 53 : SQLMAPDownloadPDF unavailable
56Lecture 54 : Cross Site ScriptingDownloadPDF unavailable
57Lecture 55 : File Upload VulnerabilityDownloadPDF unavailable
58Lecture 56 : The NMAP Tool: A Relook (Part I)DownloadPDF unavailable
59Lecture 57 : The NMAP Tool: A Relook (Part II)DownloadPDF unavailable
60Lecture 58 : The NMAP Tool: A Relook (Part III)DownloadPDF unavailable
61Lecture 59 : Network Analysis using WiresharkDownloadPDF unavailable
62Lecture 60 : Summarization of the CourseDownloadPDF unavailable