1 00:00:00,120 --> 00:00:03,840 Welcome to this course titled practical ethical hacking. 2 00:00:03,950 --> 00:00:09,600 I am your instructor heat atoms and I'm excited for this journey that we're going to be taking together. 3 00:00:09,660 --> 00:00:10,860 So a really quick. 4 00:00:10,860 --> 00:00:12,030 Who am I. 5 00:00:12,030 --> 00:00:19,710 I am a husband hacker military veteran etc. I am a former accountant that is turned into a security 6 00:00:19,710 --> 00:00:25,250 geek and I own my own penetration testing company called TCM security. 7 00:00:25,380 --> 00:00:29,190 So I'm known online by the personality of the cyber mentor. 8 00:00:29,190 --> 00:00:32,010 I am a twitch streamer a YouTube ba. 9 00:00:32,070 --> 00:00:33,840 I have Twitter. 10 00:00:33,840 --> 00:00:39,060 I'm on the social media is OK and I love teaching ethical hacking concepts. 11 00:00:39,060 --> 00:00:43,300 I love ethical hacking and penetration testing and I'm excited for this course. 12 00:00:43,320 --> 00:00:44,490 So why this course. 13 00:00:44,490 --> 00:00:47,490 What makes this course different than all the other courses that are out there. 14 00:00:47,850 --> 00:00:50,550 Well this is geared towards practical experience. 15 00:00:50,550 --> 00:00:55,140 I'm taking you down the road of a penetration testers slash ethical hacker. 16 00:00:55,140 --> 00:00:57,810 I don't want to teach you unnecessary tools. 17 00:00:57,810 --> 00:01:00,980 I don't want to give you things that you're not going to need to know. 18 00:01:01,080 --> 00:01:06,630 And we're really going to touch base on a lot of things that I just don't see covered anywhere else. 19 00:01:06,630 --> 00:01:12,900 I'm going to explain things to you like a five year old and I want you to pick them up and understand 20 00:01:12,900 --> 00:01:18,640 the concepts not just fly through tools and really we're going to cover so many cool topics here. 21 00:01:18,660 --> 00:01:23,670 One that I'm really excited about is active directory penetration testing which I don't see covered 22 00:01:23,910 --> 00:01:24,450 anywhere. 23 00:01:24,630 --> 00:01:29,490 And that's something that is such a critical knowledge point that you need to know to be a penetration 24 00:01:29,490 --> 00:01:31,330 tester such ethical hacker. 25 00:01:31,410 --> 00:01:32,820 And nobody talks about it. 26 00:01:33,300 --> 00:01:38,240 So speaking of let's really quickly talk about the topics that are going to be covered in this course. 27 00:01:38,250 --> 00:01:40,530 So right now we are in the introduction. 28 00:01:40,650 --> 00:01:45,090 We're going to talk about effective note keeping and why you should take good notes never going to go 29 00:01:45,090 --> 00:01:47,760 into networking Linux and python. 30 00:01:47,760 --> 00:01:53,070 And we're going to cover those because they are important for your foundations to be a good ethical 31 00:01:53,070 --> 00:01:55,030 hacker and penetration tester. 32 00:01:55,050 --> 00:02:00,210 So once we get out of the foundational section of this course we're going to talk about external network 33 00:02:00,210 --> 00:02:03,330 hacking which is what you see in most courses. 34 00:02:03,330 --> 00:02:08,190 Then we're gonna move on to this Active Directory exploitation where we build out an Active Directory 35 00:02:08,190 --> 00:02:10,330 lab and we exploit it. 36 00:02:10,460 --> 00:02:13,050 If you have no idea of Active Directory is that's OK. 37 00:02:13,050 --> 00:02:15,080 We're going to cover that later on in the course. 38 00:02:15,240 --> 00:02:18,300 But it is so fun and such a great experience. 39 00:02:18,300 --> 00:02:19,920 I'm really looking forward to that. 40 00:02:20,070 --> 00:02:23,040 On top of that we're going to talk about Web application exploitation. 41 00:02:23,040 --> 00:02:25,600 We'll talk about common attacks that you're going to see. 42 00:02:25,650 --> 00:02:28,020 We'll talk through wireless exploitation. 43 00:02:28,020 --> 00:02:32,190 We'll also talk there report writing and common legal documentation. 44 00:02:32,220 --> 00:02:36,840 I'm going to walk you through the documents that I have when I talked to a client on sales meetings 45 00:02:36,870 --> 00:02:42,210 and we'll cover report writing on how to write a report and I'll provide you with a sample report and 46 00:02:42,210 --> 00:02:45,520 show you what a real pen test report looks like. 47 00:02:45,540 --> 00:02:49,140 Finally we're going to wrap up the course with career advice. 48 00:02:49,140 --> 00:02:50,750 So I'm going to stop here. 49 00:02:50,760 --> 00:02:55,110 One thing I'm going to say right now is go to the bonus video. 50 00:02:55,110 --> 00:02:57,330 Please go to the bonus video first. 51 00:02:57,600 --> 00:03:03,450 Why I say that is because due to terms and policy on you to me I cannot share personal links with you 52 00:03:03,750 --> 00:03:09,860 one that I want to share with you is a discord channel that is going to be utilized for this course 53 00:03:09,870 --> 00:03:13,330 specifically we have 4000 people in the discord already. 54 00:03:13,380 --> 00:03:19,680 I just want you to be aware that resources available in case you have any sort of troubleshooting issues 55 00:03:19,980 --> 00:03:22,390 or questions related to the course etc.. 56 00:03:22,500 --> 00:03:26,530 So please go check out that video first before you move on to the next video. 57 00:03:26,670 --> 00:03:31,900 Just so you have the resources available to you when you are going through this course. 58 00:03:31,950 --> 00:03:36,510 Otherwise I look forward to seeing you in this course in growing with you through this course. 59 00:03:36,510 --> 00:03:38,460 And I really do hope you enjoy it. 60 00:03:38,520 --> 00:03:40,280 So let's move on into the next video.