Hi everyone! I hope you enjoyed this video. Please do consider subscribing so we can continue making awesome hacking content! Below is all of the course info: Full Course: academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course All Course Resources/Links: github.com/Gr1mmie/Practical-Ethical-Hacking-Resources A shout out to all those involved with helping out on this course: Alek - Creating "Academy", "Dev", and "Black Pearl" Capstone machines and a Discord Admin. Dewalt - The one man Army of a five star support team. Dwight - Discord Admin and awesome hacker. Grimmie - Creation of SumRecon, lover of cookies, and a Discord Admin. Joe Helle - Creating the "Blue" Capstone machine and the PNPT foothold. The OG support staff and a Discord Admin. Lian - The OG Discord Admin with French Bulldogs I'd like to steal. Rumham - Discord Admin, lover of rum and hams, and overall great guy. 0:00 - Introduction/whoami 6:20 - A Day in the Life of an Ethical Hacker 23:14 - Effective Notekeeping 29:58 - Important Tools 35:23 - Networking Refresher: Introduction 36:39 - IP Addresses 49:50 - MAC Addresses 53:07 - TCP, UDP, & the Three-Way Handshake 58:25 - Common Ports & Protocols 1:04:39 - The OSI Model 1:10:14 - Subnetting 1:37:17 - Installing VMWare / VirtualBox 1:43:37 - Installing Kali Linux 1:50:11 - Configuring VirtualBox 1:53:32 - Kali Linux Overview 1:57:05 - Sudo Overview 2:02:22 - Navigating the File System 2:14:26 - Users & Privileges 2:23:54 - Common Network Commands 2:29:50 - Network Commands Update 2:31:49 - Installing & Updating Tools 2:41:01 - Installing gedit 2:42:46 - Viewing, Creating, & Editing Files 2:48:49 - Scripting with Bash 3:11:28 - Intro to Python 3:13:52 - Strings 3:21:25 - Math 3:27:24 - Variables & Methods 3:38:41 - Functions 3:49:40 - Boolean Expressions 3:54:14 - Relational & Boolean Operators 4:01:13 - Conditional Statements 4:10:13 - Lists 4:20:41 - Tuples 4:23:16 - Looping 4:28:18 - Importing Modules 4:34:24 - Advanced Strings 4:47:47 - Dictionaries 4:55:23 - Sockets 5:00:55 - Building a Port Scanner 5:21:09 - The 5 Stages of Ethical Hacking 5:26:31 - Passive Recon Overview 5:34:07 - Identifying Our Target 5:37:46 - Discovering Email Addresses 5:53:38 - Breached Credentials Part 1 6:01:00 - Breached Credentials Part 2 6:13:00 - Hunting Subdomains Part 1 6:18:35 - Hunting Subdomains Part 2 6:23:30 - Identifying Website Technologies 6:30:39 - Gathering Information w/ Burp Suite 6:39:33 - Google Fu 6:45:09 - Utilizing Social Media 6:50:49 - Installing Kioptrix 6:57:12 - Scanning w/ Nmap 7:17:04 - Enumerating HTTP/HTTPS Part 1 7:32:09 - Enumerating HTTP/HTTPS Part 2 7:47:22 - Enumerating SMB 8:01:46 - Enumerating SSH 8:05:59 - Researching Potential Vulnerabilities 8:20:54 - Our Notes So Far 8:24:03 - Scanning w/ Nessus Part 1 8:34:42 - Scanning w/ Nessus Part 2 8:40:57 - Reverse Shells vs Bind Shells 8:48:02 - Staged vs Non-Staged Payloads 8:51:27 - Gaining Root w/ Metasploit 8:59:13 - Manual Exploitation 9:11:57 - Brute Force Attacks 9:19:50 - Credential Stuffing & Password Spraying 9:33:58 - Our Notes, Revisited 9:37:05 - Capstone Introduction 9:42:54 - Setting up Blue 9:46:55 - Blue Walkthrough 10:04:00 - Academy Setup 10:06:28 - Academy Walkthrough 10:50:52 - Dev Walkthrough 11:16:18 - Butler Walkthrough 11:52:41 - Blackpearl Walkthrough 12:16:17 - Conclusion
It seems I need to start really from the beginning because a lot is unclear for me. 1 hour in and I understand nothing (example all the ports) *Does anyone have a place where I can learn all the knowledge that is needed prior to this course? Thank you for your help
Thanks for this! I finished an I.T. degree in 2009. I forgot 99% of it, so this was like a refresher. Networking was always my weak spot, and I struggled through the courses. I remember we were given an ip address for our final project, and had to network a fake company with 5000 pc's. I think I went a week without sleeping.
@@ABMOL36 No dear, this seems like a newbie social engineering trick. The comments section is full of this exact same story of yours. Please stay away from us, or you'll be reported. Thank you, dear.
Hi everyone! Am extremely excited and feel blessed to click on this video. I know it super long, but so far....am loving every single second about it. I always wanted to do something in the IT filed, but with my busy schedule...I was always contemplating on where do I start, what am I going to focus my studies on and how difficult will it be for me with no IT background? However, watching this video have answered to all the questions. Thanks for taking your time to put this together for people like me.
@@KrishPatel-lr8cl ah yes. ok. Bro but if i watch this video will it be wasting my time or what other suggestions will u give me bc i'm interested in hacking & already learned some basic html and python
@@biz20072008 or actually be smart and just get an adblocker. ever since i installed one i have barely seen any advertisements on any website, including youtube, all for the price of 0 dollars compared to something you pay for, monthly, for one website.
Great course, but it would be very great to have the video segmented into chapters. For those of us who are familiar with the basics and looking for specific chapters, it would be amazing!
I'm 4,5 hours into this lesson so far and I'm loving it. It's really well made. Good structure and easy to follow. I especially like how you've divided everything into small sections or videos (that you've also timestamped). It makes learning all this so much more digestible in my opinion. Thank you so much for making this.
@@zaamin8544 Maybe your pip is too small. Jokes aside I don't know how to help with that because you didn't provide any information. You didn't tell me what you tried that didn't work, you didn't write down any error messages. How am I supposed to help you mate?
I've reached the exploitation part and to be honest, this is a very detailed course that people would pay for. I love the way you teach, when we approach certain command line you explain it thoroughly, the concept behind what we doing, the process, terminologies, tools, even the PIMPMYKALI is super useful and mentioned here. You have approached the challenges with your way and not hesitating to teach us here. Godbless you, my man. Looking forward to learn other courses from your channel and your website!
Thank you for your time, as well as, creating such an "in-depth" layout of what will be expected. It was very informative and easy to follow. Again, thank you for this! Very much appreciated.
I was able to watch the full video. Very detailed descriptions, detailed ways on how to enumerate. 💯 I have learnt ALOT. Going for the next 12 hours now.
I already know how to program through years of doing it but haven't really touched up on ethical hacking. It is very useful to know what is going on when you or someone else is being hacked, and I appreciate that this it is free course you have spent a long time making. Since I just want to learn the basics of ethical hacking to prevent some it, I don't really feel the need to buy paid ethical hacking courses. 💖
Well coding can be applied to any job. It's not needed for every IT job but can be used for most IT jobs. Project managers, network engineers, software engineers, security engineers or cyber security, data analysts and scientists can all use it. I'm not sure how many jobs have to know it but they can all use it and get paid more in their fields if they know how to code.
I have some tasks that I present to whoever can accomplish them, I will give him $500 on a daily basis. Whoever can communicate with me and reach an understanding on this must be an expert in the prohibited sites
I’m extremely grateful for this information. School has been tough, especially that I’m going online. Watching this video makes everything easier to comprehend for me. I’m forced to purchase the course now. I feel that I need to learn everything that’s presented and get the pen testing cert. mostly important investing into the course will be a way of me saying thank you.
I am just starting the 12 hour course. I've always been looking for what I can do and love. I've made 100,000 a year hating my life. I quit that job after 8 years of "lack of stimulation". After listening to darknet diaries and realizing I can be a puzzle solver to help people and get paid to do it...I'm very excited to get started.
What a great guy and even a better mentor!! Added this to my playlist on youtube and look forward to checking back in on your content! Hope all is well, keep up the great content!
Thanks Heath, this has been great and you are very good at simplifying it for those of us who are new to the field. I will likely buy several of your next lessons and look forward to learning more from you. Maybe we will work together in the future.
I'm a little over 4 hours into the video and I'm loving it. I had taken a basic Python course prior and it's a refresher for me so I appreciate that you are able to keep it short, to the point, and interesting. What drove me to make a comment is this is the first time I have been able to make a note taking platform that worked for me. Thank you so much for teaching me a skill that I can take anywhere I go even outside an education environment. I have never been more effective at note taking. Keep up the good work and I have every intention of going through more of your courses before I begin my Bachelors Program.
@Infamous My bad for a late response I'm not big on checking my YT. I have no professional experience but I have been a big tech guy since early high school (about ten years). This course is great for a complete beginner in cyber security, but it really only has a networking "refresher". I would recommend taking a more in depth entry level networking class if that's what you're looking for. Google offers a course that covers networking pretty well and you get a recognized cert from it.
Having only listened to the first 30 mins I must say I’m extremely impressed with how the speaker challenges any individual to have the correct mindset in pursuing ethical hacking and pen-testing.
Thank you for your hard work and dedication poured into making this video. I am deeply grateful to you. Great and informative for a complete newbie like myself. The timestamps helped as well, I work with python a lot so I was glad when I could skip a few hours of the video hahaha. Will also definitely be purchasing your other contents after I finished with this video.
If you do not have the Cyber Mentor's Subnetting Sheet with you, an easy way to know the number of hosts if a CIDR number is given is to: 1. Subtract CIDR value from 32 (Example: /24. 32 - 24 = 8) 2. Take the difference and use it as power to base 2 (Example: 2^8 = 256) 3. Subtract 2 from the result to get your number of hosts (Example: 256 - 2 = 254 number of hosts)
I saved up money for the TCM course and cert from a janky network admin contract where I'm really a Desktop Admin who sits on his hands all day. I cant wait to take this course!
I would advice to be careful You gotta love this team. Anom6000hack There's always so upbeat and genuinely seems happy, I admire his positive outlook. He doesn't make mistakes. He seems to have learned a hard lesson but what better way to grow. More power to him! I wish him all the good fortune I'm sure he'll reap in future Endeavours. He's the best here
This is absolute gold! Very practical and very affordable training. I highly recommend checking out the full course. You will definitely learn a lot! Thank you for all you do for the cybersecurity community!
@@Khan_Adventures im currently in the latter years of my IT degree so I have a little background in the workings on security and IT working. I just reached the 3 hour mark and so far it seems like a good foundation. I havent got super into the nitty gritty of the hacking portion with Metasploit, beef, nmap, etc so I cant say for sure for bug bounties but it seems like a good starting point that could pretty reasonably get to a point to do bug bounties.
Subnetting and networking in general has always been a massive pain for me. Thank you for covering network stuff so in-depth before moving into the other areas first. It really has helped me remember a lot of stuff that I have forgotten over the years - I don't use subnetting day-to-day, and it is a very perishable skill. Hard to learn, easy to forget. Thank you for taking the time to explain it. :)
Subnetting is not that hard. Took me about 3 weeks of doing exercises. Once you learn it properly it stays with you. Haven't used for years but can still answer subnet questions quite easily
This is a freaking gold mine, thank you very much. Very informative and you sir got an amazing voice to listen to. Where can I get more courses like this that you teach?
I have this course and haven't yet planned to open it. Quite busy. Will go in for this video and then to my course. Thank you for giving us this course on UA-cam. God bless. 👍
Mnemonic for OSI I'm using was from one of the CompTIA courses and it's stuck in my head since, it's from layer 7 to 1: A Priest Saw Ten Nuns Doing Pushups. Thanks for the course TCM.
You explained the Subnetting perfectly! I was able to understand it the first time you explained it. It really comes down to the math and some logical thinking.
These videos are reallllllll gold...what do you doooooo mennnnnn🤔🤔 you are hero of me after this time... everything a ethical hacker also a programmer also a web developers need areee in hereeee absolutely i can't believe ❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️
Just started the course and the neumonic for the OSI model made me laugh. I remember it from 7 to 1, All People Seem To Need Data Protection :) I started out transitioning from my current customer service work a couple months ago into the field of Cyber Security and Ethical Hacking got my attention after meeting with a pentester from the company i work for, already had a bit of IT knowledge but decided to start at the basic stuff. A+ course material, Network+ material, Linux (also done your youtube course), understanding/reading python code (also your course and other) and now i felt confident enough to start this course and see if it is to my liking and purchase the full course and maybe several other courses. Again a really big thank you for making these video's and with that helping me to hopefully get a job in the field!
Super job explaining and laying out the critical specifics. I already installed KALI VIA USB boot. 2 hrs . into course. I am a Control Systems Lead for factory automation. So I had to learn some networking to use Rockwell Automation software.
Amazing! Now I need a course on how to use this ethical hacking to hack into banks and transfer money without leaving a paper trail. Looking forward to that!
I really like listening to you man… You’re a really nice guy and cover all the bases. I just jumped into this by accident but I’m so interested that I watched the whole vid and now I’ve started looking into studying this subject … thank you man.
Unethical hacker turned to a ethical hacker here,I just want to say that what u are doing is great, I wish I had something like this during my transition.
your subnetting session was very fruitfull. atleast i feel i am 5-6 steps ahead after going through your instructions. I agree i cannot get it very quickly but this was really really helpful
This is absolutely amazing and you are such a great mentor!! I have watched an hour while getting ready for work.... and already absorbed SO MUCH! I will be setting aside a full day this weekend, starting from the beginning with NOTES!!! THANK YOUUU!! ❤️
@The Cyber Mentor - 2:59:18 - `seq 1 254` Those are called backticks used in the for loop. Also what is the name of the app that you used for the Assessment notes in 'Our Notes So Far' - 8:20:54 ? Keepnote?
I am a software tester but never ended up getting my first job after graduation, almost 3 years now. so Im now getting into pen testing since there is alot of it. I am excited for this!
@Mauri Font lol what are you smoking? @H G it's the half of that is offered in Udemy. Udemy course is 22.5 hours and has sections not included in this course. I am not sure about the price since my company has an enterprise account. And unfortunately , I haven't been able to finish it yet :( fml
Hey Bro nice Introduction i really think i need to start documanting what i learn , it's great way to deeper understanding and also find your people who are in the same journey thanks for the great free content bro i hope you all the best Thanks a lot 😃🤩
I would like to thank you sir, I have never been able to. watch a complete course before. Now i am 5 hours through and i did not get bored :). You do not complicate things and very thorough. 👍👍👍
Wow I rediscovered you again *Metaspyclub* !!!! This was my first cybernetics thing I did after I woke up having my partner’s chats showing on my phone after refreshing but mostly amazing to watch what a human being is able to create from scratch with only few tools coming direct from nature wow I'm so glad I found you ! Can't wait to use more services.
As a 16 year old who understood most of the things after you explained them i would like to thank you for making it possible for everyone to learn about this stuff!!! I really enjoy that you can learn whatever you want nowadays!
Python course recalls the basics quicker than anywhere else. Just seeing in text I would not absorb the content as well. It's incredible how I love bash scripting.
I plan to get the course from your website and the Pentest course (and the Pentest cert) but this is amazing while I save up! Thank you for this! Love your voice!
Great work to you sir.. I really enjoy following up your courses. Ethical hacking cyber security is something I have a deep passion for, tho I have a lot to learn and am happy to have a tutor like you
How are you dear? I made stupid a mistake of turning on 2 Factor Authentication on Facebook. I used Google Authenticator app. Later, totally forgot about Authenticator and reset my phone. Now, although I know the password, I can no longer log in/I have not been able to login to my facebook for weeks because the Google Authenticator is gone. I tried resetting the password, but 2FA is still there. I still have access to the yahoo account associated with the Facebook. Please help me dear🙏
First, thank you for sharing this. I was a NetAdmim for a large hospital for several years, years ago. NT was new and HIPAA was not even a thing then. Some of the books were still a thing.... Wanted to return to IT, Pentesting, etc... For awhile. Just starting the video now. Will update when finished, but i did want to thank you for putting this together. BTW, I have been a locksmith for 12 years now. I love the "legal B&E" I can also hand file keys or determine key from pictures, shadow box, or even just seeing a key for less than 5 seconds with about a 90% accuracy. It is a blast!!!
Great course! Thank you so much for posting it! I wanted to say that since most of the machines grab a DHCP address from the start, why not remove those password files and have everyone get used to running their ipsweep script to find the IP? When I was going through this course I wanted to cheat as little as possible so that's what I did, unless the device didn't pull DHCP because I needed to run dhclient on it. It felt great to use a script that "I had written" while following the early part of the course to get the address of a target machine. It really felt like building on something I had already learned to do something new. Obviously you are the expert and this is just the suggestion of someone who is grateful for what knowledge you are sharing freely. But that sense of accomplishment was awesome. Thanks again for this video and all the time you must have put into making it!
Bro...so good. Thank you so much for making this course. Just the note taking sections is gold, let alone the others sections. I am only 45 mins in and am a Sub for life.
I would advice to be careful You gotta love this team. Anom6000hack There's always so upbeat and genuinely seems happy, I admire his positive outlook. He doesn't make mistakes. He seems to have learned a hard lesson but what better way to grow. More power to him! I wish him all the good fortune I'm sure he'll reap in future Endeavours. He's the best here
what a way to start 2022! 🔥🔥 you're the only reason someone like me from an unknown country (Syria) with no good internet connection, no power (electricity) and definitely no online transactions possible since most sites block my country's IPs anyway... really, from the bottom of my heart thank you Heath I wish you and your family a blessed new year and may god aid you in your hardships (since life can't be empty of those)
a message from your brother in Iran : bro ... don't pay your time on the technology yet ... ISIS , Sofiani , these terrorists wants to get your dreamy land .... keep your state , do sport , do military stuff . improve your soul by reading Qoran defend your land ... we will give you whatever you want about technology whatever we have.... both of us ,we're in Islamic empire
You did a phenomenal job with this series. Thank you for your time and effort to share your knowledge in such a succinct and proficient video. I'm beyond grateful for the technicality of your work and the tools and knowledge I now have to go deeper into this field. Stellar work.
Thank you for this knowledge! Someone please help, I am able to connect to the Kioptrix Apache server thru the IP when connecting to HTTP, but not HTTPS. It says 'Secure connection failed' and there is no way to bypass it.
Hey. I realy like you course and is so helpfull but I have just one problem. My gedit is black and I have just white color in. When I try change color to have multicolor I have error all the time. Can someone help wit that?
Just started the course and love it already. I thought I’d share, I’ve been a help desk admin for 10 years and a data center admin/ mdm admin for the past two, The best Powershell command I learned was (get-command verb-command).Parameters 🔥🔥🔥 Or Get-Command -Verb “Get” -Module “ActiveDirectory” This helped me so much when trying to build my syntax in Powershell, I will always choose BASH, but if you must work with Powershell, these are a must to use.
The Cyber Mentor.... if you don't mind may i call you teacher... your this video seriously guide me a lot and it also had clear my concept of ip address and subnet masking.... this video is really interesting, i would like to learn more from you.
I hope to be able to get that certificate someday! i have 1 year industrial mechanic and 1 year with transportation and logistics. I really think Pentesting or cyber security in general is the job for me. i love learning computers and have been the family nerd since i got my first computer at 14 years old (2009), But my mom was'nt able to pay for school. The jobs back then were few and far apart also (in the IT buisiness) so i didn't dare take up loans for it. that is my lifes biggest regret. But its ever to late i guess :D
right now is one of the best times to be able to learn, cause you can learn anything one, I hope you get a job in IT one day, cause I know you can do it!!!
Hi The Cyber Mentor I really liked the first impression of your lectures, I believe you are contributing your community value contribution. Thanks alot.
Hi everyone! I hope you enjoyed this video. Please do consider subscribing so we can continue making awesome hacking content! Below is all of the course info:
Full Course: academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course
All Course Resources/Links: github.com/Gr1mmie/Practical-Ethical-Hacking-Resources
A shout out to all those involved with helping out on this course:
Alek - Creating "Academy", "Dev", and "Black Pearl" Capstone machines and a Discord Admin.
Dewalt - The one man Army of a five star support team.
Dwight - Discord Admin and awesome hacker.
Grimmie - Creation of SumRecon, lover of cookies, and a Discord Admin.
Joe Helle - Creating the "Blue" Capstone machine and the PNPT foothold. The OG support staff and a Discord Admin.
Lian - The OG Discord Admin with French Bulldogs I'd like to steal.
Rumham - Discord Admin, lover of rum and hams, and overall great guy.
0:00 - Introduction/whoami
6:20 - A Day in the Life of an Ethical Hacker
23:14 - Effective Notekeeping
29:58 - Important Tools
35:23 - Networking Refresher: Introduction
36:39 - IP Addresses
49:50 - MAC Addresses
53:07 - TCP, UDP, & the Three-Way Handshake
58:25 - Common Ports & Protocols
1:04:39 - The OSI Model
1:10:14 - Subnetting
1:37:17 - Installing VMWare / VirtualBox
1:43:37 - Installing Kali Linux
1:50:11 - Configuring VirtualBox
1:53:32 - Kali Linux Overview
1:57:05 - Sudo Overview
2:02:22 - Navigating the File System
2:14:26 - Users & Privileges
2:23:54 - Common Network Commands
2:29:50 - Network Commands Update
2:31:49 - Installing & Updating Tools
2:41:01 - Installing gedit
2:42:46 - Viewing, Creating, & Editing Files
2:48:49 - Scripting with Bash
3:11:28 - Intro to Python
3:13:52 - Strings
3:21:25 - Math
3:27:24 - Variables & Methods
3:38:41 - Functions
3:49:40 - Boolean Expressions
3:54:14 - Relational & Boolean Operators
4:01:13 - Conditional Statements
4:10:13 - Lists
4:20:41 - Tuples
4:23:16 - Looping
4:28:18 - Importing Modules
4:34:24 - Advanced Strings
4:47:47 - Dictionaries
4:55:23 - Sockets
5:00:55 - Building a Port Scanner
5:21:09 - The 5 Stages of Ethical Hacking
5:26:31 - Passive Recon Overview
5:34:07 - Identifying Our Target
5:37:46 - Discovering Email Addresses
5:53:38 - Breached Credentials Part 1
6:01:00 - Breached Credentials Part 2
6:13:00 - Hunting Subdomains Part 1
6:18:35 - Hunting Subdomains Part 2
6:23:30 - Identifying Website Technologies
6:30:39 - Gathering Information w/ Burp Suite
6:39:33 - Google Fu
6:45:09 - Utilizing Social Media
6:50:49 - Installing Kioptrix
6:57:12 - Scanning w/ Nmap
7:17:04 - Enumerating HTTP/HTTPS Part 1
7:32:09 - Enumerating HTTP/HTTPS Part 2
7:47:22 - Enumerating SMB
8:01:46 - Enumerating SSH
8:05:59 - Researching Potential Vulnerabilities
8:20:54 - Our Notes So Far
8:24:03 - Scanning w/ Nessus Part 1
8:34:42 - Scanning w/ Nessus Part 2
8:40:57 - Reverse Shells vs Bind Shells
8:48:02 - Staged vs Non-Staged Payloads
8:51:27 - Gaining Root w/ Metasploit
8:59:13 - Manual Exploitation
9:11:57 - Brute Force Attacks
9:19:50 - Credential Stuffing & Password Spraying
9:33:58 - Our Notes, Revisited
9:37:05 - Capstone Introduction
9:42:54 - Setting up Blue
9:46:55 - Blue Walkthrough
10:04:00 - Academy Setup
10:06:28 - Academy Walkthrough
10:50:52 - Dev Walkthrough
11:16:18 - Butler Walkthrough
11:52:41 - Blackpearl Walkthrough
12:16:17 - Conclusion
Thank you brother ❤️❤️
Thank you very much Heath
love you from Nepal
It seems I need to start really from the beginning because a lot is unclear for me.
1 hour in and I understand nothing (example all the ports)
*Does anyone have a place where I can learn all the knowledge that is needed prior to this course?
Thank you for your help
@@harald_schubert I know how to feels.
0:00 - Introduction/whoami
6:20 - A Day in the Life of an Ethical Hacker
23:14 - Effective Notekeeping
29:58 - Important Tools
35:23 - Networking Refresher: Introduction
36:39 - IP Addresses
49:50 - MAC Addresses
53:07 - TCP, UDP, & the Three-Way Handshake
58:25 - Common Ports & Protocols
1:04:39 - The OSI Model
1:10:14 - Subnetting
1:37:17 - Installing VMWare / VirtualBox
1:43:37 - Installing Kali Linux
1:50:11 - Configuring VirtualBox
1:53:32 - Kali Linux Overview
1:57:05 - Sudo Overview
2:02:22 - Navigating the File System
2:14:26 - Users & Privileges
2:23:54 - Common Network Commands
2:29:50 - Network Commands Update
2:31:49 - Installing & Updating Tools
2:41:01 - Installing gedit
2:42:46 - Viewing, Creating, & Editing Files
2:48:49 - Scripting with Bash
3:11:28 - Intro to Python
3:13:52 - Strings
3:21:25 - Math
3:27:24 - Variables & Methods
3:38:41 - Functions
3:49:40 - Boolean Expressions
3:54:14 - Relational & Boolean Operators
4:01:13 - Conditional Statements
4:10:13 - Lists
4:20:41 - Tuples
4:23:16 - Looping
4:28:18 - Importing Modules
4:34:24 - Advanced Strings
4:47:47 - Dictionaries
4:55:23 - Sockets
5:00:55 - Building a Port Scanner
5:21:09 - The 5 Stages of Ethical Hacking
5:26:31 - Passive Recon Overview
5:34:07 - Identifying Our Target
5:37:46 - Discovering Email Addresses
5:53:38 - Breached Credentials Part 1
6:01:00 - Breached Credentials Part 2
6:13:00 - Hunting Subdomains Part 1
6:18:35 - Hunting Subdomains Part 2
6:23:30 - Identifying Website Technologies
6:30:39 - Gathering Information w/ Burp Suite
6:39:33 - Google Fu
6:45:09 - Utilizing Social Media
6:50:49 - Installing Kioptrix
6:57:12 - Scanning w/ Nmap
7:17:04 - Enumerating HTTP/HTTPS Part 1
7:32:09 - Enumerating HTTP/HTTPS Part 2
7:47:22 - Enumerating SMB
8:01:46 - Enumerating SSH
8:05:59 - Researching Potential Vulnerabilities
8:20:54 - Our Notes So Far
8:24:03 - Scanning w/ Nessus Part 1
8:34:42 - Scanning w/ Nessus Part 2
8:40:57 - Reverse Shells vs Bind Shells
8:48:02 - Staged vs Non-Staged Payloads
8:51:27 - Gaining Root w/ Metasploit
8:59:13 - Manual Exploitation
9:11:57 - Brute Force Attacks
9:19:50 - Credential Stuffing & Password Spraying
9:33:58 - Our Notes, Revisited
9:37:05 - Capstone Introduction
9:42:54 - Setting up Blue
9:46:55 - Blue Walkthrough
10:04:00 - Academy Setup
10:06:28 - Academy Walkthrough
10:50:52 - Dev Walkthrough
11:16:18 - Butler Walkthrough
11:52:41 - Blackpearl Walkthrough
12:16:17 - Conclusion
It's very helpful man thnk you very much
@@saikatkarmakar7609 Now At what Stage your Ethical Hacking Is?
@creator pin this comment bro
You are a 10/10
You are a G Bruv
\
I'm only 1.5 hours into the course and this was hands down the best explanation I've seen on internet on subnetting so far. Amazing material
same
I’m 30 seconds in and I’m dreading that I read that there’s subnetting involved 😩😩
Kendi memleketimden birilerinin bunlara ilgi duyması iyi hissettiriyor
Agreed
Abla nerden geldin 😄😄
You had me at "give back to the community"! Subscribed and will set time aside to watch the full 12 hrs. Thank you!
is this course complete or u need to puchase after watching 12hrs .
this video lasted longer than my friends relationship.
🤣💔
xD
@@dystopiaisutopia you wonder why your dad beats you every night
@@bobbyscrelcher Whoa, edgyyy, he was correcting you man. Learn from mistakes.
@@zethcader6478 you wonder why you’re mom left you
I must say as a Network Engineer myself, that subnet sheet is very useful!
Thanks for this! I finished an I.T. degree in 2009. I forgot 99% of it, so this was like a refresher. Networking was always my weak spot, and I struggled through the courses. I remember we were given an ip address for our final project, and had to network a fake company with 5000 pc's. I think I went a week without sleeping.
@@ABMOL36 No dear, this seems like a newbie social engineering trick. The comments section is full of this exact same story of yours. Please stay away from us, or you'll be reported. Thank you, dear.
@@ABMOL36 Btw if you're being legit, then it's better to go ask Facebook's support team instead of newbies wanting to become ethical hackers.
@@Dtomper wut
@@S.O.N.E It was my response to a scammer that eventually deleted his comment.
you finished an IT degree and networking is your weak spot?
Hardly do training courses like this all the way through, but I'm almost 10 hours in and it's totally worth it!
Hi everyone! Am extremely excited and feel blessed to click on this video. I know it super long, but so far....am loving every single second about it. I always wanted to do something in the IT filed, but with my busy schedule...I was always contemplating on where do I start, what am I going to focus my studies on and how difficult will it be for me with no IT background? However, watching this video have answered to all the questions. Thanks for taking your time to put this together for people like me.
Ye video sahi me achha h yaa nahi kaam ayega abhi me 1st year me hu engineering complete ho jayega 1st 20 day to me ye prefer kar sakta hu kya ????
@@KrishPatel-lr8cl Engineering and hacking is different bro. So it won't be helpful to u
@@Faker233 bro means IT kar Raha hu information technology ✅
And IT is a part of computer engineering so I called engineering ✅
@@KrishPatel-lr8cl ah yes. ok. Bro but if i watch this video will it be wasting my time or what other suggestions will u give me bc i'm interested in hacking & already learned some basic html and python
12 hours of knowledge in a UA-cam video. Now this is something I will tolerate ads for. Great work 👍
Doesn't if feel great when you give somebody, who deserves it, money by watching a short advertisement?
@@adum2198 people don't understand, they just want everything for free.
Or stop being cheap and get UA-cam premium.
@@biz20072008 or actually be smart and just get an adblocker. ever since i installed one i have barely seen any advertisements on any website, including youtube, all for the price of 0 dollars compared to something you pay for, monthly, for one website.
@@silentwhisper868 and what is that Adblocker ??
Great course, but it would be very great to have the video segmented into chapters. For those of us who are familiar with the basics and looking for specific chapters, it would be amazing!
Check the description
@@johnnysnakes7765 you can’t trick anyone whit something that cheap
@@zhanucong4614 what do you mean
@@iSyre johny snakes sounds like bot
*hacker sniper50 official page*
*Thank you for your guidance, I really appreciate it.* 🇺🇸🇺🇸🇺🇸🇺🇸
5 stars are not enough to rate how amazing and how much effort was made to make this. Amazing Course.
I'm 4,5 hours into this lesson so far and I'm loving it. It's really well made. Good structure and easy to follow. I especially like how you've divided everything into small sections or videos (that you've also timestamped). It makes learning all this so much more digestible in my opinion. Thank you so much for making this.
Bro , could you help me my pip doesnt installll.
@@zaamin8544 Maybe your pip is too small.
Jokes aside I don't know how to help with that because you didn't provide any information. You didn't tell me what you tried that didn't work, you didn't write down any error messages. How am I supposed to help you mate?
@@K4113B4113 nah I managed to do it. Thanks anyways.
@@K4113B4113 nerd
@@cIockwis_e 🤓
I've reached the exploitation part and to be honest, this is a very detailed course that people would pay for. I love the way you teach, when we approach certain command line you explain it thoroughly, the concept behind what we doing, the process, terminologies, tools, even the PIMPMYKALI is super useful and mentioned here. You have approached the challenges with your way and not hesitating to teach us here. Godbless you, my man. Looking forward to learn other courses from your channel and your website!
Thank you for your time, as well as, creating such an "in-depth" layout of what will be expected. It was very informative and easy to follow. Again, thank you for this! Very much appreciated.
where the replies
@@av1871 😂😂😂
*hacker sniper50 official page*
*Thank you for your guidance, I really appreciate it.* 🇺🇸🇺🇸🇺🇸🇺🇸
*hacker sniper50 official page*
*Thank you for your guidance, I really appreciate it.* 🇺🇸🇺🇸🇺🇸🇺🇸
*hacker sniper50 official page*
*Thank you for your guidance, I really appreciate it.* 🇺🇸🇺🇸🇺🇸🇺🇸
I was able to watch the full video. Very detailed descriptions, detailed ways on how to enumerate. 💯 I have learnt ALOT. Going for the next 12 hours now.
I just completed it , He is the best mentor ❤️
where is the link of next 12 hours?
@@udhayathiruna in the video description
I already know how to program through years of doing it but haven't really touched up on ethical hacking. It is very useful to know what is going on when you or someone else is being hacked, and I appreciate that this it is free course you have spent a long time making. Since I just want to learn the basics of ethical hacking to prevent some it, I don't really feel the need to buy paid ethical hacking courses. 💖
Well coding can be applied to any job. It's not needed for every IT job but can be used for most IT jobs. Project managers, network engineers, software engineers, security engineers or cyber security, data analysts and scientists can all use it. I'm not sure how many jobs have to know it but they can all use it and get paid more in their fields if they know how to code.
I have some tasks that I present to whoever can accomplish them, I will give him $500 on a daily basis. Whoever can communicate with me and reach an understanding on this must be an expert in the prohibited sites
What u learnt
I’m extremely grateful for this information. School has been tough, especially that I’m going online. Watching this video makes everything easier to comprehend for me. I’m forced to purchase the course now. I feel that I need to learn everything that’s presented and get the pen testing cert. mostly important investing into the course will be a way of me saying thank you.
it has been a month and I'm still watching , this course is amazing.
how did it go
you did a better job in explaining networking in an hour than my teacher did in 3 years on god and i wish she will see this comment one day
I am just starting the 12 hour course. I've always been looking for what I can do and love. I've made 100,000 a year hating my life. I quit that job after 8 years of "lack of stimulation". After listening to darknet diaries and realizing I can be a puzzle solver to help people and get paid to do it...I'm very excited to get started.
Hi, did you finish the course?
Hi are you going to start? Then let's start together.
Are things working out?
@@joyaustin6581 unfortunately I have yet to find a proper onramp
What a great guy and even a better mentor!! Added this to my playlist on youtube and look forward to checking back in on your content! Hope all is well, keep up the great content!
This is one guy you dont want to be toxic on a game with..... Bros gonna expose all of you darkest secrets. Also hands down The Best Explanations Ever
Thanks Heath, this has been great and you are very good at simplifying it for those of us who are new to the field. I will likely buy several of your next lessons and look forward to learning more from you. Maybe we will work together in the future.
I'm a little over 4 hours into the video and I'm loving it. I had taken a basic Python course prior and it's a refresher for me so I appreciate that you are able to keep it short, to the point, and interesting. What drove me to make a comment is this is the first time I have been able to make a note taking platform that worked for me. Thank you so much for teaching me a skill that I can take anywhere I go even outside an education environment. I have never been more effective at note taking. Keep up the good work and I have every intention of going through more of your courses before I begin my Bachelors Program.
Hey bro ...need a help
@@cartoons2865 With?
With Hacking can we talk on instagram can I get your I'd
@Infamous My bad for a late response I'm not big on checking my YT. I have no professional experience but I have been a big tech guy since early high school (about ten years). This course is great for a complete beginner in cyber security, but it really only has a networking "refresher". I would recommend taking a more in depth entry level networking class if that's what you're looking for. Google offers a course that covers networking pretty well and you get a recognized cert from it.
Having only listened to the first 30 mins I must say I’m extremely impressed with how the speaker challenges any individual to have the correct mindset in pursuing ethical hacking and pen-testing.
Hi sir
in the philippines we only have 200 cyber security employee, and this type of videos are very useful to help us!
Learnt Soo Much From This Course, Especially The GTFO Bins Was Mind Blowing! Truly Awesome!!
You’re really doing a great work helping my journey into computer forensics. Your courses are better than any other
I agree! My dad went to school for that and I have a lot of books on the subject but nobody explains what I needed to know better…
Thank you for your hard work and dedication poured into making this video. I am deeply grateful to you. Great and informative for a complete newbie like myself. The timestamps helped as well, I work with python a lot so I was glad when I could skip a few hours of the video hahaha. Will also definitely be purchasing your other contents after I finished with this video.
Hello again. How do I purchase the materials please?
If you do not have the Cyber Mentor's Subnetting Sheet with you, an easy way to know the number of hosts if a CIDR number is given is to:
1. Subtract CIDR value from 32 (Example: /24. 32 - 24 = 8)
2. Take the difference and use it as power to base 2 (Example: 2^8 = 256)
3. Subtract 2 from the result to get your number of hosts (Example: 256 - 2 = 254 number of hosts)
thank you so much! very helpful
Still didn't understand
I saved up money for the TCM course and cert from a janky network admin contract where I'm really a Desktop Admin who sits on his hands all day. I cant wait to take this course!
You’re an amazing teacher. I’m so happy I found this video!
Ye video sahi me achha h yaa nahi kaam ayega abhi me 1st year me hu engineering complete ho jayega 1st 20 day to me ye prefer kar sakta hu kya ????
Started the course yesterday just wrapping up. Thank You for giving back 💯💯
Really have been enjoying this video and your other videos. Excited to keep learning more and more!
I would advice to be careful You gotta love this team. Anom6000hack There's always so upbeat and genuinely seems happy, I admire his positive outlook. He doesn't make mistakes. He seems to have learned a hard lesson but what better way to grow. More power to him! I wish him all the good fortune I'm sure he'll reap in future Endeavours. He's the best here
Hi
This is absolute gold! Very practical and very affordable training. I highly recommend checking out the full course. You will definitely learn a lot! Thank you for all you do for the cybersecurity community!
Ye video sahi me achha h yaa nahi kaam ayega abhi me 1st year me hu engineering complete ho jayega 1st 20 day to me ye prefer kar sakta hu kya ????
Am 3 hours in and I think this course is great! 👍🏻 just wanted to say thank you 🙏 very well explained and ease to understand your a great teacher
Did you complete? Is it enough for bug bounty?
@@Khan_Adventures im currently in the latter years of my IT degree so I have a little background in the workings on security and IT working. I just reached the 3 hour mark and so far it seems like a good foundation. I havent got super into the nitty gritty of the hacking portion with Metasploit, beef, nmap, etc so I cant say for sure for bug bounties but it seems like a good starting point that could pretty reasonably get to a point to do bug bounties.
@@Khan_Adventures sorry I just saw ur message I still haven’t finished so I wouldn’t be able to tell u just yet … but I’ll keep u posted 🤘
@@Khan_Adventures yes and the class is great but in my opinion it’s not enough for big bounty’s
Subnetting and networking in general has always been a massive pain for me. Thank you for covering network stuff so in-depth before moving into the other areas first. It really has helped me remember a lot of stuff that I have forgotten over the years - I don't use subnetting day-to-day, and it is a very perishable skill. Hard to learn, easy to forget. Thank you for taking the time to explain it. :)
your not alone bro
Commong subnetting is easy
Subnetting is not that hard. Took me about 3 weeks of doing exercises. Once you learn it properly it stays with you. Haven't used for years but can still answer subnet questions quite easily
The way you teach i swear it goes straight to the head. Absolutely loved it 😀😀
Thank you very much, man!
I really enjoyed this 12-hour journey (it took much more than that). Learnt lots of stuff about hacking and IT. Thank you!
yeah did take a lot of time but for sure worth it!
This is a freaking gold mine, thank you very much.
Very informative and you sir got an amazing voice to listen to.
Where can I get more courses like this that you teach?
Hi, outside of UA-cam, you can find all of our courses at academy.tcm-sec.com
I have this course and haven't yet planned to open it. Quite busy. Will go in for this video and then to my course. Thank you for giving us this course on UA-cam. God bless. 👍
The best guy on the youtube sharing all the necessary info ❤️❤️ appreciate it
I bought the course to support you and to have the deeper learning I’ll be needing to look back at as I practice on my own time.
was it any good fam? im planning to buy.
Mnemonic for OSI I'm using was from one of the CompTIA courses and it's stuck in my head since, it's from layer 7 to 1: A Priest Saw Ten Nuns Doing Pushups. Thanks for the course TCM.
Where have you been sir? I was searching all my life for this one.You gained a new fan:)
You explained the Subnetting perfectly! I was able to understand it the first time you explained it. It really comes down to the math and some logical thinking.
These videos are reallllllll gold...what do you doooooo mennnnnn🤔🤔 you are hero of me after this time... everything a ethical hacker also a programmer also a web developers need areee in hereeee absolutely i can't believe ❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️
Just started the course and the neumonic for the OSI model made me laugh. I remember it from 7 to 1, All People Seem To Need Data Protection :)
I started out transitioning from my current customer service work a couple months ago into the field of Cyber Security and Ethical Hacking got my attention after meeting with a pentester from the company i work for, already had a bit of IT knowledge but decided to start at the basic stuff. A+ course material, Network+ material, Linux (also done your youtube course), understanding/reading python code (also your course and other) and now i felt confident enough to start this course and see if it is to my liking and purchase the full course and maybe several other courses. Again a really big thank you for making these video's and with that helping me to hopefully get a job in the field!
Super job explaining and laying out the critical specifics. I already installed KALI VIA USB boot. 2 hrs . into course. I am a Control Systems Lead for factory automation. So I had to learn some networking to use Rockwell Automation software.
Just wanted to sy that you are one of a kind man . Keep the holy work . Cheers
This man Deserves some donation for all this effort. 👏 Thank You for Free Education 🙏
Amazing! Now I need a course on how to use this ethical hacking to hack into banks and transfer money without leaving a paper trail. Looking forward to that!
I really like listening to you man… You’re a really nice guy and cover all the bases. I just jumped into this by accident but I’m so interested that I watched the whole vid and now I’ve started looking into studying this subject … thank you man.
I love seeing people supporting each other in this messed up world. Thank you.
I have a project that can earn you huge amounts of money... How can we talk privately?
Unethical hacker turned to a ethical hacker here,I just want to say that what u are doing is great, I wish I had something like this during my transition.
your subnetting session was very fruitfull. atleast i feel i am 5-6 steps ahead after going through your instructions. I agree i cannot get it very quickly but this was really really helpful
Just found you, and wow. Im a pre noob and very interested now.... Thanks Heath, Great job!
This is absolutely amazing and you are such a great mentor!! I have watched an hour while getting ready for work.... and already absorbed SO MUCH! I will be setting aside a full day this weekend, starting from the beginning with NOTES!!! THANK YOUUU!! ❤️
Ye video sahi me achha h yaa nahi kaam ayega abhi me 1st year me hu engineering complete ho jayega 1st 20 day to me ye prefer kar sakta hu kya ????
@@KrishPatel-lr8cl where are you yapping about anoying indian
Thank you for this great piece of content Heath & Team. Its easy to follow and get some ground knowledge on the subject.
@The Cyber Mentor - 2:59:18 - `seq 1 254` Those are called backticks used in the for loop. Also what is the name of the app that you used for the Assessment notes in 'Our Notes So Far' - 8:20:54 ? Keepnote?
You’re awesome. Your delivery of lectures is very engaging. Thank you really appreciate your dedication.
I am a software tester but never ended up getting my first job after graduation, almost 3 years now. so Im now getting into pen testing since there is alot of it. I am excited for this!
After a long time finally I got something worth watching. Thank you TCM.🥰
I haven't finished the full course in udemy :( time is really an enemy. I hope everyone interested in this path sees this video so much value
Is the course on Udemy the same on his website?
it is free?
@@HG-bj6dg this video is just half of the full course
@Mauri Font lol what are you smoking?
@H G it's the half of that is offered in Udemy. Udemy course is 22.5 hours and has sections not included in this course. I am not sure about the price since my company has an enterprise account. And unfortunately , I haven't been able to finish it yet :( fml
@@karasu6182 it's paid, but it is cheap when you get it on sale around $12 I think.
This was so informative! I am switching careers and what a amazing course! Thank you!
What is your current career?
Hey Bro nice Introduction i really think i need to start documanting what i learn , it's great way to deeper understanding and also find your people who are in the same journey thanks for the great free content bro
i hope you all the best
Thanks a lot
😃🤩
I would like to thank you sir, I have never been able to. watch a complete course before. Now i am 5 hours through and i did not get bored :). You do not complicate things and very thorough. 👍👍👍
Wow I rediscovered you again *Metaspyclub* !!!! This was my first cybernetics thing I did after I woke up having my partner’s chats showing on my phone after refreshing but mostly amazing to watch what a human being is able to create from scratch with only few tools coming direct from nature wow I'm so glad I found you ! Can't wait to use more services.
As a 16 year old who understood most of the things after you explained them i would like to thank you for making it possible for everyone to learn about this stuff!!! I really enjoy that you can learn whatever you want nowadays!
im 16 too
@@exo556 same
@@doopie7037 what kind of skills do u have?
@@exo556 nice question
Hey
Python course recalls the basics quicker than anywhere else. Just seeing in text I would not absorb the content as well. It's incredible how I love bash scripting.
I plan to get the course from your website and the Pentest course (and the Pentest cert) but this is amazing while I save up! Thank you for this! Love your voice!
How is it going?
how did it go
Great work to you sir.. I really enjoy following up your courses. Ethical hacking cyber security is something I have a deep passion for, tho I have a lot to learn and am happy to have a tutor like you
How are you dear? I made stupid a mistake of turning on 2 Factor Authentication on Facebook. I used Google Authenticator app. Later, totally forgot about Authenticator and reset my phone. Now, although I know the password, I can no longer log in/I have not been able to login to my facebook for weeks because the Google Authenticator is gone. I tried resetting the password, but 2FA is still there. I still have access to the yahoo account associated with the Facebook.
Please help me dear🙏
@@ABMOL36 use your registered numb to recover ,than you will get authentication code on that numb
@@arvlogs505 I dont use my phone number, rather I use my yahoo email
@@ABMOL36 I can help you
First, thank you for sharing this. I was a NetAdmim for a large hospital for several years, years ago. NT was new and HIPAA was not even a thing then. Some of the books were still a thing.... Wanted to return to IT, Pentesting, etc... For awhile. Just starting the video now. Will update when finished, but i did want to thank you for putting this together. BTW, I have been a locksmith for 12 years now. I love the "legal B&E" I can also hand file keys or determine key from pictures, shadow box, or even just seeing a key for less than 5 seconds with about a 90% accuracy. It is a blast!!!
Thats so awesome, the hacker mentality
Great course! Thank you so much for posting it! I wanted to say that since most of the machines grab a DHCP address from the start, why not remove those password files and have everyone get used to running their ipsweep script to find the IP? When I was going through this course I wanted to cheat as little as possible so that's what I did, unless the device didn't pull DHCP because I needed to run dhclient on it. It felt great to use a script that "I had written" while following the early part of the course to get the address of a target machine. It really felt like building on something I had already learned to do something new. Obviously you are the expert and this is just the suggestion of someone who is grateful for what knowledge you are sharing freely. But that sense of accomplishment was awesome. Thanks again for this video and all the time you must have put into making it!
Bro...so good. Thank you so much for making this course. Just the note taking sections is gold, let alone the others sections. I am only 45 mins in and am a Sub for life.
I would advice to be careful You gotta love this team. Anom6000hack There's always so upbeat and genuinely seems happy, I admire his positive outlook. He doesn't make mistakes. He seems to have learned a hard lesson but what better way to grow. More power to him! I wish him all the good fortune I'm sure he'll reap in future Endeavours. He's the best here
what a way to start 2022! 🔥🔥
you're the only reason someone like me from an unknown country (Syria) with no good internet connection, no power (electricity) and definitely no online transactions possible since most sites block my country's IPs anyway...
really, from the bottom of my heart thank you Heath I wish you and your family a blessed new year and may god aid you in your hardships (since life can't be empty of those)
Mashallah
a message from your brother in Iran :
bro ... don't pay your time on the technology yet ...
ISIS , Sofiani , these terrorists wants to get your dreamy land ....
keep your state , do sport , do military stuff . improve your soul by reading Qoran
defend your land ... we will give you whatever you want about technology whatever we have.... both of us ,we're in Islamic empire
@@spguy7559 what the hell is wrong with you?
@@spguy7559 Then why are you here, go read quoran , bringing up political and religious matters unnecessarly
@@spguy7559 I’m pretty sure following the Koran is what messed up the Middle East, and many other places, to begin with
You did a phenomenal job with this series. Thank you for your time and effort to share your knowledge in such a succinct and proficient video. I'm beyond grateful for the technicality of your work and the tools and knowledge I now have to go deeper into this field. Stellar work.
please hack pubg uc without ban account
hats off , for such a brilliant man, we are highly thankful to you for giving us your time and skills..
Thank you for this knowledge!
Someone please help, I am able to connect to the Kioptrix Apache server thru the IP when connecting to HTTP, but not HTTPS. It says 'Secure connection failed' and there is no way to bypass it.
Hey. I realy like you course and is so helpfull but I have just one problem. My gedit is black and I have just white color in. When I try change color to have multicolor I have error all the time. Can someone help wit that?
Could you please contact me? I would like a service from you
Just started the course and love it already. I thought I’d share, I’ve been a help desk admin for 10 years and a data center admin/ mdm admin for the past two, The best Powershell command I learned was
(get-command verb-command).Parameters
🔥🔥🔥
Or
Get-Command -Verb “Get” -Module “ActiveDirectory”
This helped me so much when trying to build my syntax in Powershell, I will always choose BASH, but if you must work with Powershell, these are a must to use.
I have a project that can earn you huge amounts of money... How can we talk privately?
Bro, you are an awesome teacher
Thank you I learned a lot of things from this video.
Thank you sir ,Thank you so much. Really have been enjoying this video . Excited to keep learning more and more!
if you have experience with Linux, Network, and Python you can skip to 5:21:06
I have a project that can earn you huge amounts of money... How can we talk privately?
Thanks. This video is helping me in my IT and hacking journey. Do you have any videos about networking or mobile app pentestimg?
Amazing explanation on subnet. I used to cast doubt on its existence but now I finally understand.
Man this is insane! No one goes through it like this! Thank you!
Anybody else watching this with absolute zero tech background?
I have no experience with using tech in this way. I’m going to learn it
literally same, it's the future . mastering this will bring you great fortune forsure. @@rayzuniga4962
Imma gonna lurn 😂
😂😂
The Cyber Mentor.... if you don't mind may i call you teacher... your this video seriously guide me a lot and it also had clear my concept of ip address and subnet masking.... this video is really interesting, i would like to learn more from you.
Best and simpliest explaination of subnets I've ever gotten, Never really understood it until now thanks :)
Can you do unethical hacking full course next?
Listing this in the gym>>>>
"dont worry if this doesnt make sence" proceeds to explain ip in a way that i totally understand it for the first time
Hello Sir, thank you so much for this great video. what"s about using obsidian to organize notes ?
Thank you very much, actually subnetting just clicked for me after watching your explanation. Great job
I hope to be able to get that certificate someday! i have 1 year industrial mechanic and 1 year with transportation and logistics. I really think Pentesting or cyber security in general is the job for me. i love learning computers and have been the family nerd since i got my first computer at 14 years old (2009), But my mom was'nt able to pay for school. The jobs back then were few and far apart also (in the IT buisiness) so i didn't dare take up loans for it. that is my lifes biggest regret.
But its ever to late i guess :D
Keep that good work up!
I‘m sure you can do it
@@0xh04x thanks 😁
right now is one of the best times to be able to learn, cause you can learn anything one, I hope you get a job in IT one day, cause I know you can do it!!!
Thanks for this course, extremely helpful.
Heath! is the real MVP. Best course I have taken. Period.
He is such a nice guy and wonderful personality to learn from
I have a project that can earn you huge amounts of money... How can we talk privately?
Hi The Cyber Mentor I really liked the first impression of your lectures, I believe you are contributing your community value contribution. Thanks alot.