whitesec cyber security
whitesec cyber security
  • 21
  • 841 124
ethical hacking course in 12 hours | introduction to ethical hacking | ethical hacking from scratch
Welcome to introduction to ethical hacking and Cybersecurity Course by Whitesec Cybersecurity Consultancy!
Pro Tip: Save Time
We recommend watching the course at 1.5x speed to cover more content efficiently without missing out on key information!
00:00 - Introduction (Must Watch)
02:38 - Ethical Hacking Explained: Why Companies Hire Hackers
28:28 - Ports & Penetration Testing: Why They Matter
53:53 - What is the Cyber Kill Chain? (Overview)
56:31 - Cyber Kill Chain Stages with Real-Life Examples
1:12:35 - Introduction to Center for Internet Security (CIS)
1:18:51 - How CIS Controls Protect Organizations
1:35:13 - VMware vs. VirtualBox: Which One Should You Use?
1:37:20 - Why Virtual Machines Are Crucial for Ethical Hacking
1:47:09 - Kali Linux: The Ultimate Tool for Hackers
1:51:41 - Why You Don’t Need Dual Boot for Kali Linux
1:54:54 - Downloading and Installing VMware & VirtualBox
1:59:09 - Step-by-Step Setup of Kali Linux in VMware
2:06:49 - Practice Lab: Setting Up Metasploitable2
2:13:04 - Installing Windows 10 in a Virtual Machine
2:23:07 - Scanning a Network for Connected Devices
2:29:53 - Public vs. Private IPs: Why Hackers Care
2:45:09 - Why Scanning a Network is the First Step in Hacking
2:47:52 - Finding Devices with Netdiscover
2:56:57 - Quick Tips for Updating Firewalls
2:58:58 - Nmap Essentials: Learn Network Scanning (Mini-Course)
3:57:42 - How Nmap Helps in Ethical Hacking
4:27:00 - Detecting Firewalls (WAF) with Nmap Scripts
4:40:10 - What is a WAF? Why Hackers Bypass Them
4:54:30 - Active vs. Passive Scanning: What's the Difference?
5:11:07 - OSINT Basics: How to Collect Public Information
5:19:06 - Using Search Operators to Find Sensitive Information
5:22:45 - Identifying Website Titles with Search Tricks
5:27:16 - Discovering Open Directories on Websites
5:31:09 - Finding Addresses Using Public Data
5:32:24 - Search for Hidden Content Using Keywords
5:36:50 - Find Files Using Specific File Types Online
5:40:26 - Locate Backlinks to Your Website
5:44:44 - Detecting Default Server Pages (Apache/Nginx)
5:49:21 - Identifying Exposed Repositories
5:56:55 - Finding Open IIS Servers
5:59:06 - Identifying Remote Desktop (RDP) Servers
6:02:35 - Discover Telnet and SNMP Servers
6:06:06 - Find Open FTP Servers and Network Printers
6:09:35 - Exposing Security Cameras on Networks
6:15:38 - Tracking Down Routers and Network Devices
6:19:14 - How to Identify Vulnerable Servers
6:26:56 - Create Your Own Search Queries to Find Sensitive Info
6:32:48 - Finding Subdomains of Websites
6:37:02 - Deep Dive into System Hacking Techniques
7:00:11 - Exploring Metasploit: The Ultimate Hacking Tool
7:08:31 - Metasploit Basics for Beginners
7:54:34 - Keyloggers Explained with Practical Demo
8:03:21 - How Brute Force Attacks Work (With Demo)
8:44:39 - Cracking Password Hashes: A Practical Guide
9:16:59 - Researching Vulnerabilities & Exploitation Techniques
9:33:23 - Phishing Attacks: Why and How Hackers Use Them
9:50:45 - Introduction to the Social Engineering Toolkit (SET)
9:53:34 - Harvesting Credentials Using SET
10:00:27 - Mass Mailer Attack: Phishing Simulation Demo
10:08:54 - Creating Payloads and Listeners for Attacks
10:24:11 - Powershell Attacks: Injecting Shellcode
10:29:50 - Converting Powershell Scripts into EXE Files
10:35:35 - Infectious Media Attacks Using Bad USB
10:46:11 - QR Code Attacks: How They Work
10:50:38 - Beef Framework: Social Engineering Made Easy
10:59:45 - MITM & ARP Spoofing: Practical Class
11:28:40 - Overview of Our Red Team Training
11:41:41 - Advanced Android Hacking & Testing Techniques
Udemy - www.udemy.com/user/whitesec-23/
telegram channel - t.me/whiteseconlinecybersecurityorg
Disclaimer -
This video is made available for educational and informational purposes only.
All our videos have been made using our own systems, servers, routers, and websites. It does not contain any illegal activities. Our sole purpose is to raise awareness related to cybersecurity and help our viewers learn ways to defend themselves from any hacking activities. whitesec cybersecurity is not responsible for any misuse of the provided information.
join our Red team training -
Training curriculum - trainings.whitesec.org
contact us WhatsApp - wa.me/918019263448
advance android training -
training curriculum - trainings.whitesec.org/adv
contact us WhatsApp - wa.me/918019263448
cyber security and ethical hacking course
ethical hacking services
hacking for beginners full course
online ethical hacking course
hacking full course
ethical hacking class
cyber security hacking course
nmap hacking
ethical hacker bootcamp
introduction to ethical hacking
learn hacking course
ethical hacking services
ethical hacker classes
hacking course online
cyber hacking course
best ethical hacking course
#ethicalhacking #technology #cybersecurity
Переглядів: 21 081

Відео

Burp Suite Complete Course in 2 hours
Переглядів 9 тис.Місяць тому
Welcome to the Complete Beginner's Guide to Burp Suite! If you're eager to learn web penetration testing, this course is perfect for you. It's a hands-on, practical tutorial that covers everything you need to know. Watch at 1.5x or 1.7x speed for efficient learning. topics 👇 0:00 - Introduction to Burp Suite 0:37 - What is Burp Suite? Benefits and Advantages 6:03 - How to Configure Burp Suite P...
social engineering full course | social engineering toolkit full course in 1 hour
Переглядів 15 тис.2 місяці тому
in this course you will learn about social engineering toolkit learn How to Perform social engineering using social engineering toolkit framework a complete hands on practical course try to watch it in 1.5x course topics 👇 0:00 Introduction must watch 1:30 setting up Attacker Machine 5:58 setting up practice machine - windows 10 9:20 overview of social engineering toolkit 12:08 setoolkit - Cred...
wifi penetration testing in 1 hour | wifislax | wifi pentesting
Переглядів 6 тис.2 місяці тому
In this course you will learn how to perform wifi penetration testing using wifislax. complete hands on practical training to perform wifi penetration testing try to watch it in 1.5x for good experience topics ✔ 0:00 Introduction 2:30 wifislax - Operating system for wifi penetration testing 7:49 installing wifislax on vmware 14:59 wifi adapter for Pentesting 23:39 Tools for wifi Penetration tes...
Vulnerability Assessment course in 1 hour | vulnerability scanner | vulnerability scanning tools
Переглядів 11 тис.3 місяці тому
Learn How to Perform Vulnerability Assessment using free tools - complete course on how to perform vulnerability Assessment using free tools 0:00 Introduction 1:40 what is vulnerability assessment 7:38 Features of a vulnerability assessment 11:50 Vulnerability assessment tools 21:54 steps of vulnerability assessment 23:52 Advantages of vulnerability assessment 31:49 setting up lab for practice ...
Beef Framework For Ethical Hackers | beef browser exploitation | the browser exploitation framework
Переглядів 6 тис.3 місяці тому
in this course you will learn how to use the browser exploitation framework for red teaming A complete course on beef framework 0:00 introduction 1:27 setting up beef (Local) 11:32 Beef for red team assessment 20:43 Beef - Basic Hook 29:30 Beef - Getting Initial access - Metasploit 40:36 Beef - Hook in fake site 56:36 - Red Team training Udemy - www.udemy.com/user/whitesec-23/ telegram channel ...
learn penetration testing in 11 hours | penetration testing training
Переглядів 65 тис.4 місяці тому
penetration testing training for beginners learn penetration testing in 11 hours want to to learn how to perform pentest or penetration testing then this course is for you. try to watch it in 1.5x 0:00 important 5:21 setup Attacker machine 9:17 setup target machines 13:24 Penetration testing - (Enumeration, exploiting CMS (Drupal), P.E through suid binaries ) 46:20 Penetration testing - (Enumer...
Ethical hacking tools in linux | kali penetration testing tools | kali linux penetration testing
Переглядів 10 тис.4 місяці тому
Ethical hacking course - linux for hackers in this course you will learn about kali linux tools which are useful in ethical hacking and penetration testing fully hands on practical ethical hacking course. course topics :- 0:00 Introduction - must watch 0:41 What we are learning here 5:28 kali linux - importance of old kali versions 13:44 Installing kali linux in vmware 18:14 kali linux hacking ...
Google Dorking Course | Master in google dork commands | Ethical hacking | Basic to Advance course
Переглядів 16 тис.5 місяців тому
Google Dorking For ethical Hackers full course From Basic to Advance level try to watch this training in 1.5x topics - 0:00 Introduction 0:50 Google Hacking - site Operator 4:32 Google Hacking - intitle Operator 9:04 Google Hacking - Directory Listing 12:58 Google Hacking - Address OSINT 14:10 Google Hacking - intext operator 18:33 Google Hacking - filetype operator 22:15 Google Hacking - link ...
windows for hackers | penetration testing using windows | hacking using windows
Переглядів 4,1 тис.6 місяців тому
In this course you will learn how to perform ethical hacking in windows. topics - 0:00 intro (must watch) 1:09 setting up victim Machine 6:00 Installing windows ( Attacker Machine ) 14:55 metasploit for windows - How to install 24:06 installing Python in windows (Attacker Machine) 27:25 Generating Msfvenom Payload on windows 33:10 Msfconsole - Listening for incoming connections on Windows 36:38...
penetration testing course | penetration testing course for beginners
Переглядів 7 тис.6 місяців тому
Penetration testing course for beginners - Learn how to perform Penetration testing using kali linux 0:00 introduction (must watch) 0:35 setting up Target and Attacker Machine 6:08 scanning connected Devices 7:03 identifying target operating system 9:09 scanning all open ports 10:49 Service Version Detection and Enumeration 14:42 Finding hidden directories 21:16 Vulnerability scanning using nik...
nmap full course in 7 hours | nmap for ethical hacking | full nmap ethical hacking course
Переглядів 74 тис.6 місяців тому
nmap full course - Become a Master in Nmap Scanning Try to watch this training in 1.5x 🎯 topics 📝 0:00 Introduction to Nmap Course (Must watch) 3:07 setting lab for Practice 25:40 what is nmap 30:22 what is a port scan 39:20 7 layers of OSI model 43:38 Analyzing network layer using Wireshark 53:39 Scanning TCP and UDP ports 1:04:07 Tcp headers 1:13:10 Complete 3 way handshake 1:27:23 Network Di...
Penetration testing course in 3 hours | free ethical hacking courses | learn penetration testing
Переглядів 42 тис.7 місяців тому
free penetration testing course in 3 hours by whitesec cyber security consultancy pvt ltd. ethical hacking course by whitesec cyber security consultancy pvt ltd. course content :- 0:00 Introduction (must watch) 4:29 How to install kali linux in vmware 9:08 Basic scanning (Scanning Vulnerable Machine) 16:24 configure your host-only adaptor to subnet 22:44 Port scanning and service enumeration 34...
Ethical hacking course 11 hours | Beginner edition | ethical hacker training course
Переглядів 136 тис.9 місяців тому
Free Advance Ethical hacking course by whitesec cyber security consultancy pvt ltd. try to watch it in 1.5x 👍 topics📝 0:00 introduction must watch 0:21 cybersecurity (common cyber threats) 5:19 setting up a Attacker machine 11:21 setting up victim machine 16:19 kali Linux Terminal 31:23 File Permissions in kali linux 51:34 Users and groups in linux 57:38 passwd and shadow file in linux 1:06:45 ...
WI-FI Hacking Crash Course for Absolute Beginners [NEW]
Переглядів 25 тис.11 місяців тому
wifi Penetration or wifi hacking course for beginners who want to Learn how hacker hacks wifi network. the course is complete Practical even if you don't have wifi hacking knowledge still you can watch this wifi hacking course for beginners who are curious to learn how to pentest wep wps wpa wpa2 networks free wifi hacking course by whitesec cyber security consultancy pvt ltd. ▬▬▬▬▬▬ T I M E S ...
kali Nethunter Full Course | Kali Linux for Android | Ethical hacking course | Kali Nethunter
Переглядів 21 тис.Рік тому
kali Nethunter Full Course | Kali Linux for Android | Ethical hacking course | Kali Nethunter
Complete Ethical hacking course 16 hours | part 2 | free ethical hacking course | whitesec |
Переглядів 13 тис.Рік тому
Complete Ethical hacking course 16 hours | part 2 | free ethical hacking course | whitesec |
Complete Ethical hacking course 16 hours | ethical hacking full course with practical | Zero to Hero
Переглядів 275 тис.Рік тому
Complete Ethical hacking course 16 hours | ethical hacking full course with practical | Zero to Hero
open ports Hacking course - Open Ports Penetration Testing training | Ethical Hacking | course
Переглядів 15 тис.Рік тому
open ports Hacking course - Open Ports Penetration Testing training | Ethical Hacking | course
Hacking using Termux | Termux full course | Hacking using Termux | termux hacking course
Переглядів 34 тис.Рік тому
Hacking using Termux | Termux full course | Hacking using Termux | termux hacking course
Windows hacking course in 6 hours | windows Penetration testing | Penetration testing full course
Переглядів 37 тис.Рік тому
Windows hacking course in 6 hours | windows Penetration testing | Penetration testing full course

КОМЕНТАРІ

  • @Viaspace101
    @Viaspace101 12 годин тому

    I never miss your videos, I always request a bugbounty vulns sql, xss, and so on. One day u will upload it and thank you what u are doing for us

  • @MuhammadArqam-ey4kp
    @MuhammadArqam-ey4kp 16 годин тому

    Bro please upload a new vedio on "METASPLOIT FRAMEWORK" PLZZ ❤

  • @PradeepRwt
    @PradeepRwt День тому

    Bug bounty course please

  • @sudharsansudan4997
    @sudharsansudan4997 2 дні тому

    Please upload networking course beginner to advanced

  • @tarunkumar1035
    @tarunkumar1035 2 дні тому

    #googledorks

  • @tarunkumar1035
    @tarunkumar1035 2 дні тому

    #OSINT

  • @tarunkumar1035
    @tarunkumar1035 2 дні тому

    Part 2 🔥

  • @FahruxGamer
    @FahruxGamer 2 дні тому

    Sir bring more tools for Kali Linux

  • @Muhammadimranasim6697
    @Muhammadimranasim6697 4 дні тому

    ❤ from Pakistan 🇵🇰

  • @shashank5520
    @shashank5520 5 днів тому

    Bro can u please make a complete course on bug bounty like this

  • @umerzzzz5801
    @umerzzzz5801 5 днів тому

    Is it necessary that the victim should be in same network for pishing attack please reply and let me know that it's not necessary and if not than what's the procedure to send someone pishing link and listen to that open port please reply

  • @vijjuchaki123
    @vijjuchaki123 5 днів тому

    Namaste Sir your teaching is vvvvery good sir. sir i am getting the result like "Exploit completed, but no session was created."

  • @moneyheist.telugu
    @moneyheist.telugu 6 днів тому

    sir explain networking

  • @EEG-price
    @EEG-price 8 днів тому

    Where is the Breach machine...can't find it.

  • @BadalKumar-fn6sn
    @BadalKumar-fn6sn 8 днів тому

    Thanks Bhai

  • @BadalKumar-fn6sn
    @BadalKumar-fn6sn 9 днів тому

    Thanks buddy ! I completed this

  • @Zeref0xD
    @Zeref0xD 10 днів тому

    Sir when sqli?

    • @Zeref0xD
      @Zeref0xD 10 днів тому

      I am waiting for it

  • @yogeshyo-c2i
    @yogeshyo-c2i 10 днів тому

    what to do if it comes as request timed out during pinging from control prompt?

    • @whiteseccybersecurity
      @whiteseccybersecurity 10 днів тому

      If you’re getting a request timed out message while pinging, here are some tips - Check Connectivity - Make sure the target host is online by pinging another IP. Firewall Issues - The target might have a firewall blocking ICMP requests. Network Configuration - Double-check your IP settings to ensure you’re on the same network (if your doing internal pentest) Use Alternative Tools - Use other tools like tracert (or traceroute on Linux) to see if packets are being dropped along the path, or nmap to scan for open ports. and also check our nmap course where we covered this practically

  • @Disaster_JD_Gaming
    @Disaster_JD_Gaming 11 днів тому

    Sir make a full course on Web application penetration testing

    • @whiteseccybersecurity
      @whiteseccybersecurity 11 днів тому

      Thanks for the suggestion! I'll consider adding a web application penetration testing course to my list of future course ideas!

  • @BadalKumar-fn6sn
    @BadalKumar-fn6sn 12 днів тому

    Hi Bro ! Is it possible learn hacking in depth via book or we have to try hacking course.

    • @whiteseccybersecurity
      @whiteseccybersecurity 11 днів тому

      Absolutely, you can learn hacking through books! Here are some great ones "The Web Application Hacker's Handbook," "Hacking: The Art of Exploitation," "Metasploit: The Penetration Tester's Guide," and "Black Hat Python." Reading these will deepen your understanding and provide valuable insights. It's a great way to learn at your own pace!

  • @krasney_gz
    @krasney_gz 12 днів тому

    Thankful to you Sir, i hope you make a video how to use ai with hacking

    • @whiteseccybersecurity
      @whiteseccybersecurity 11 днів тому

      I'll consider adding AI for hacking to my list of future course ideas!

  • @Dr.DesTroiT
    @Dr.DesTroiT 13 днів тому

    thanks brother iam a beginner and your video helped me from the basics❤❤❤❤

    • @whiteseccybersecurity
      @whiteseccybersecurity 11 днів тому

      Thanks so much for your comment! I'm glad to hear that the video helped you with the basics. We designed it specifically to cover those foundational concepts. Keep practicing, and you'll keep improving!

    • @Dr.DesTroiT
      @Dr.DesTroiT 9 днів тому

      @@whiteseccybersecurity If you dont mind will you train me ? iam a very fast learner.

  • @Mehreen-t4g
    @Mehreen-t4g 14 днів тому

    Can i get full cyber security course with certificate

    • @whiteseccybersecurity
      @whiteseccybersecurity 11 днів тому

      Thanks for your question! Just to clarify, you won’t receive a certificate for completing a course from my UA-cam videos.

  • @Bonny2035
    @Bonny2035 14 днів тому

    bro you courses helped me get a job as a pentester . without certifications I just told them I can. And now i passed the interview... Big thanks for your efforts in training for free

    • @whiteseccybersecurity
      @whiteseccybersecurity 11 днів тому

      Wow, that’s amazing to hear! Congratulations on landing the pentester job I'm really glad my courses could help you get there, even without formal certifications. Your determination and skills made the difference! Thanks for sharing your journey, and best of luck in your new role!

    • @BharatPlayzone-jack
      @BharatPlayzone-jack 9 днів тому

      Hello bro my name is Jack. Can you tell me your journey ? We can be friends. What do you think ?

  • @Prince_Harsha
    @Prince_Harsha 15 днів тому

    Bro osint Full course bro please

  • @nathanwilson6183
    @nathanwilson6183 15 днів тому

    As a total beginner is Comptia A plus, Network plus or Security plus required to understand or do this work?

    • @whiteseccybersecurity
      @whiteseccybersecurity 15 днів тому

      You don’t need prior knowledge or certifications to watch this course. It's designed for beginners, so you can dive right in and start learning!

    • @nathanwilson6183
      @nathanwilson6183 14 днів тому

      @@whiteseccybersecurity ,thanks

  • @Satish.editz7
    @Satish.editz7 15 днів тому

    Is this work on Android termux where kali linux installed

    • @whiteseccybersecurity
      @whiteseccybersecurity 14 днів тому

      Yes, you can perform certain ethical hacking tasks using Termux with Kali Linux installed. Termux provides a Linux environment on Android, allowing you to run various penetration testing tools. Just keep in mind that the capabilities may be more limited compared to a full desktop setup.

  • @giftebenezer2040
    @giftebenezer2040 15 днів тому

    Hi there, do you have concise videos on webshells detection, mitigation and prevention?

    • @whiteseccybersecurity
      @whiteseccybersecurity 10 днів тому

      Thanks for your interest! We’re actually working on concise videos covering webshell detection, mitigation, and prevention, and they’ll be available soon. Stay tuned!

    • @giftebenezer2040
      @giftebenezer2040 10 днів тому

      @whiteseccybersecurity Appreciate it so much!

  • @129AMAR
    @129AMAR 16 днів тому

    do we need to download any software or any apps for practices ethical hacking >??

    • @whiteseccybersecurity
      @whiteseccybersecurity 16 днів тому

      For this course, you'll need to set up a lab. You'll require VMware Workstation to create your environment, and for practice, download Kali Linux as your attacker machine and Metasploitable2 for vulnerabilities. That's all you need! Just follow along with the course, and you'll be good to go!

  • @hoshankumaran
    @hoshankumaran 16 днів тому

    For motivation part how much u earn in this field sir as a carrer

    • @whiteseccybersecurity
      @whiteseccybersecurity 16 днів тому

      Thanks for your question! Earnings in this field vary based on project size larger Pentesting projects can lead to higher income, while smaller ones may earn less. We can’t disclose exact figures, but it’s important to note that our income isn’t constant sometimes it’s lower, and other times it’s more. We primarily focus on services and trainings, and much goes into tools and gadgets.

  • @CodeofDarkness
    @CodeofDarkness 16 днів тому

    Please start bug hunting or web app PENTESTING course it's a huge request from Pakistan 🇵🇰

    • @whiteseccybersecurity
      @whiteseccybersecurity 16 днів тому

      Thanks for the suggestion! I'll consider making a course on bug hunting or web app pentesting.

  • @SaiKumar-lo2zw
    @SaiKumar-lo2zw 16 днів тому

    Sir. Can you please suggest a certificate on ethical hacking, penetration testing.

    • @whiteseccybersecurity
      @whiteseccybersecurity 16 днів тому

      Sure! I recommend starting with the Certified Ethical Hacker (CEH) certification; it's one of the best in the field. After that, you might want to check out the Certified Penetration Testing (CPENT) for more advanced skills. Happy learning!

  • @mansinghsharma1335
    @mansinghsharma1335 17 днів тому

    Dear sir, First of all thanks for providing so much amazing and valuable content ❤️. I request you to please make a full course on Defensive side as well because we see mostly see SOC Analyst job openings in companies, we don't see much openings for Penetration testers. So that we can get a Job as SOC Analyst and side by side we can also prepare for red teaming. We will be thankful to you if you cover SIEM, SPLUNK, IBM QRadar, CrowdStrike and Malware Analysis.

    • @whiteseccybersecurity
      @whiteseccybersecurity 16 днів тому

      Thank you for your kind words! We mostly work as penetration testers and red teamers, and having strong certifications like OSCP or CPENT can significantly increase your chances of entering that field compared to SOC roles. We appreciate your suggestion for a defensive course and will consider it for future content!

  • @_a_a_.001
    @_a_a_.001 17 днів тому

    Thank you so much

  • @singinggrandpa4261
    @singinggrandpa4261 17 днів тому

    Sir please do a full fledged video for nessus tool. I have a problem in installation where i am not getting conplete list of scans. Also do metasploit framework full tutorial.

    • @whiteseccybersecurity
      @whiteseccybersecurity 16 днів тому

      Thanks for the suggestion! I'll definitely consider making a detailed video on Nessus and Metasploit in the future.

  • @mybucketlist_007
    @mybucketlist_007 17 днів тому

    You are just an amazing instructor Sir. Thankyou so much!

  • @Musicnpl
    @Musicnpl 17 днів тому

    Sir can you make video on how youtube channel like scammer payback and other reverse connection and hack scammer system . Can you make video on it sir. I saw many youtube channel can get access to scammer computer and they closed scammer company . So can you please make video on it how can we reverse connection on scammer computer and punish them please sir.

    • @whiteseccybersecurity
      @whiteseccybersecurity 16 днів тому

      I appreciate your suggestion! Unfortunately, we can't create content on that topic due to UA-cam policies. However, I recommend exploring ethical hacking and cybersecurity courses if you're interested in learning more about these skills. They can provide valuable insights into protecting against scams!

    • @Musicnpl
      @Musicnpl 16 днів тому

      @@whiteseccybersecurity you can brief idea only how can we reverse connection only. Not full complete video just idea how can we do that reverse to scammer please sir . Humbly request from nepal

    • @whiteseccybersecurity
      @whiteseccybersecurity 16 днів тому

      We’ll definitely cover this scenario in our future courses. Stay tuned, and stay safe!

  • @mariamhasan3733
    @mariamhasan3733 18 днів тому

    I was starting to learn cyber security, and I found your video. Thanks for this excellent content!

  • @eugeneyates1225
    @eugeneyates1225 18 днів тому

    HI THANKS FOR THIS VIDEO. I AM NEW TO CYBER SECURITY. WHERE SHOULD I START FROM. THANK YOU.

    • @whiteseccybersecurity
      @whiteseccybersecurity 18 днів тому

      Thanks for your comment! It's great to hear you're starting your journey in cybersecurity. I recommend starting with a 12-hour introductory course (this one) to get the basics down, followed by a 16-hour training for more in-depth knowledge. Since cybersecurity is quite theory-based, I also suggest you to read book Cybersecurity and Cyberwar - What Everyone Needs to Know.

  • @coperator8518
    @coperator8518 19 днів тому

    great content and teaching please try to give subtitles also

    • @whiteseccybersecurity
      @whiteseccybersecurity 18 днів тому

      Thanks for the suggestion! I'll definitely consider adding subtitles to future videos.

    • @coperator8518
      @coperator8518 18 днів тому

      @@whiteseccybersecurity sir you can't need to add subtitles you can just on auto generated subtitles in English option ☺️👍 Try this also on previous courses video I think English language subtitles can auto generated while playing.

  • @zorancvetkovski8753
    @zorancvetkovski8753 19 днів тому

    Make Kali Linux full tutorial. Beginners to advanced

    • @whiteseccybersecurity
      @whiteseccybersecurity 19 днів тому

      Thanks for your suggestion! A full tutorial on Kali Linux covering everything from beginner to advanced topics would be super helpful. I’ll definitely consider it for future content!

  • @vladspalaatu2580
    @vladspalaatu2580 19 днів тому

    best explicated tutorial i want you to be my father

  • @AmblestKanu
    @AmblestKanu 19 днів тому

    Is this all Kali Linux? I’m about to start watching , I’ve been looking for a kali Linux complete guide to using all the tools

    • @whiteseccybersecurity
      @whiteseccybersecurity 19 днів тому

      Thanks for your interest! We cover a lot of tools in this tutorial, but it’s not everything in Kali Linux. Think of it as a solid foundation! If you have specific tools in mind, let me know!

  • @sandip._.
    @sandip._. 19 днів тому

    Sir please make an informational video on how things work or handle in companies, the processes, auditing, reporting, discussion with clients for remediating the bugs etc etc

    • @whiteseccybersecurity
      @whiteseccybersecurity 19 днів тому

      Thanks for the suggestion! I'll consider creating a video on the real-world aspects of ethical hacking.

  • @moneyheist.telugu
    @moneyheist.telugu 19 днів тому

    sir please explain wireshark

    • @whiteseccybersecurity
      @whiteseccybersecurity 19 днів тому

      Thanks for the suggestion! I'll definitely consider making a course on Wireshark in the future.

  • @BadalKumar-fn6sn
    @BadalKumar-fn6sn 20 днів тому

    Let's try .

    • @whiteseccybersecurity
      @whiteseccybersecurity 19 днів тому

      Good luck!

    • @BadalKumar-fn6sn
      @BadalKumar-fn6sn 18 днів тому

      @@whiteseccybersecurity Thanks 👍 really nice. It increases to learn hacking bcz we see that it practically

  • @epageusa
    @epageusa 20 днів тому

    You sir, are a genius. Thank you so much for all of your dedication and hard work bro, this topic bring me joy and happiness to my life

    • @whiteseccybersecurity
      @whiteseccybersecurity 20 днів тому

      Thank you for the kind words! I'm glad you're enjoying the content.

  • @DivineAsiegbu
    @DivineAsiegbu 20 днів тому

    Honestly, there's nothing else again for me to say but thank you so much for this rich content that you've made completely free.... my respect bro ❤

    • @whiteseccybersecurity
      @whiteseccybersecurity 20 днів тому

      Thank you so much for your kind words! I'm really glad you found the content valuable. Your support means a lot to me! ❤

  • @Nanami-fm4rb
    @Nanami-fm4rb 20 днів тому

    Nice content please bug bounty course for beginners and this video is completed for ethical hacking concept or more please tell sir

    • @whiteseccybersecurity
      @whiteseccybersecurity 20 днів тому

      Thank you for the suggestion! I'll consider creating a bug bounty course for beginners.

  • @stopthegame1502
    @stopthegame1502 21 день тому

    Can you please tell us what should i start with because u have alot if video and am still beginner thank u

    • @whiteseccybersecurity
      @whiteseccybersecurity 20 днів тому

      Sure! I recommend starting with the 12-hour video first, and then you can move on to the 16-hour one. That way, you'll build a solid foundation. Happy learning!