
18
OctoberDiscovering Security Breaches

18
OctoberCentral Locations for Important Contact Information

18
OctoberOverview

18
OctoberCloud Security

18
OctoberConclusion

18
OctoberPresentation of the Course

18
OctoberIntroduction to Ethical Hacking

18
OctoberOverview

18
OctoberVirtual Box

18
OctoberSimulation: Downloading and Installing VirtualBox in MacOS

18
OctoberSimulation: Downloading and Installing VirtualBox in Windows

18
OctoberKali Linux

18
OctoberSimulation: Downloading and Installing Kali Linux

18
OctoberWindows System

18
OctoberSimulation: Downloading and Installing Windows Server

18
OctoberSimulation: Downloading and Installing Windows 10

18
OctoberSimulation: Change the Display Option in VirtualBox

19
OctoberOverview

19
OctoberReconnaissance

19
OctoberSimulation: Passive Reconnaissance

19
OctoberSimulation: Active Reconnaissance

19
OctoberScanning and Enumeration

19
OctoberSimulation: Enumeration and Scanning

19
OctoberGaining Access

19
OctoberSimulation: Gaining Access with Brute-Force Attack
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108