0% found this document useful (0 votes)
99 views8 pages

Ethical Hacking Basics Course Module1 PDF

Uploaded by

azizrbg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views8 pages

Ethical Hacking Basics Course Module1 PDF

Uploaded by

azizrbg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Ethical Hacking Basics Course

By : Mohammad Askar
@Mohammadaskar2

© 2016 iSecur1ty
Module 1
Intro & Lab Configuration

© 2016 iSecur1ty
About Me
● CEO at iSecur1ty.

● Security Researcher with more 6 years of experience.

● Writer and blogger at iSecur1ty.org

● Python Lover :D.

© 2016 iSecur1ty
Introduction to the course
● What we will learn ?

● Hacker or Ethical Hacker ?

● Can I be a Proffesional if I took this Course ?

● Just Be patience :D

© 2016 iSecur1ty
Why this course is different ?

© 2016 iSecur1ty
Requirements
● Any Linux Distro “Kali preferred”.

● Virtual Box or VMware workstation / player.

● 4GB RAM at least.

● Clear Mind !

© 2016 iSecur1ty
Labs Configuration
● We will Build a network that contains various clients with
vairous OS.

● Linux Machines.

● Windows Machines.

● Dedicated network.

© 2016 iSecur1ty
Labs Configuration
● Open Source Labs such as :

- Metasploitable2.
- ShellShock Lab.
- Web for Pentester.
- Windows Vuln Labs.

● iSecur1ty Labs :D

© 2016 iSecur1ty

You might also like