Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
22 views8 pages

Ethical Hacking Basics Course Module1

The Ethical Hacking Basics Course, led by Mohammad Askar, aims to teach participants the fundamentals of ethical hacking and the differences between hackers and ethical hackers. The course requires a Linux distribution, virtualization software, and a minimum of 4GB RAM, and includes hands-on labs with various operating systems. It emphasizes patience and provides access to open-source labs for practical experience.

Uploaded by

alz3eeem.m
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views8 pages

Ethical Hacking Basics Course Module1

The Ethical Hacking Basics Course, led by Mohammad Askar, aims to teach participants the fundamentals of ethical hacking and the differences between hackers and ethical hackers. The course requires a Linux distribution, virtualization software, and a minimum of 4GB RAM, and includes hands-on labs with various operating systems. It emphasizes patience and provides access to open-source labs for practical experience.

Uploaded by

alz3eeem.m
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Ethical Hacking Basics Course

By : Mohammad Askar
@Mohammadaskar2

© 2016 iSecur1ty
Module 1
Intro & Lab Configuration

© 2016 iSecur1ty
About Me
● CEO at iSecur1ty.

● Security Researcher with more 6 years of experience.

● Writer and blogger at iSecur1ty.org

● Python Lover :D.

© 2016 iSecur1ty
Introduction to the course
● What we will learn ?

● Hacker or Ethical Hacker ?

● Can I be a Proffesional if I took this Course ?

● Just Be patience :D

© 2016 iSecur1ty
Why this course is different ?

© 2016 iSecur1ty
Requirements
● Any Linux Distro “Kali preferred”.

● Virtual Box or VMware workstation / player.

● 4GB RAM at least.

● Clear Mind !

© 2016 iSecur1ty
Labs Configuration
● We will Build a network that contains various clients with
vairous OS.

● Linux Machines.

● Windows Machines.

● Dedicated network.

© 2016 iSecur1ty
Labs Configuration
● Open Source Labs such as :

- Metasploitable2.
- ShellShock Lab.
- Web for Pentester.
- Windows Vuln Labs.

● iSecur1ty Labs :D

© 2016 iSecur1ty

You might also like