My Introduction


Welcome to "Heath Adam's Practical Ethical Hacking Blogs".

I am Sheema and I am a working lady. Currently I am doing the online course from Udemy by "Heath Adams" and the course name is” Practical Ethical Hacking- Complete Course".

So, I decided to write all what I study to share with you guys on a regular basis.   
I'm excited for this journey that we're going to be taking together. 

So, a really quick 'Who am I?
I am a Working lady, a student and a Software Engineer  that is turning into a Cyber Security Professional. 
I am interested in this field and so I am doing this online course.
Else  my hobbies are watching movies, listening to songs, giving time to my family, doing makeup etc. etc.


I do have Social Media accounts that are below


So, coming back to the course, in this course Blogs, we are not going to cover the things that we don't really want to know, we are going to touch the base on a lot of things that are necessary for a person to start his/her career in Cyber Security field. 
I will be sharing the Course Outline with you guys, And the most excited thing about this course is Active directory penetration testing. 

And that's something that is such a critical knowledge point that you need to know to be a penetration tester such as ethical hacker, And nobody talks about it.

So right now, we are in the introduction.
We are going to talk about effective note keeping and why you should take good notes. We will be studying Networking, Kali Linux and Python, And we're going to cover those because they are important for your foundations to be a good ethical hacker and penetration tester.
So, Once we get out of the foundational section of this course, we're going to talk about External Network Hacking which is what you see in most courses.
Then we're going to move on to this Active Directory Exploitation where we will build out an Active Directory lab and we will exploit it.

If you have no idea of Active Directory is that's OK.

We're going to cover that later  in the course. But it is so fun and such a great experience.
I'm really looking forward to that. On top of that, We're going to talk about Web Application Exploitation.
We'll talk about common attacks that you're going to see. We’ll walk through Wireless Exploitation.
We'll also talk about report writing and common legal documentation.
I'm going to take you through the documents and we'll cover report writing on how to write a report and I'll provide you with a sample report.
Finally, we're going to wrap up the course with career advice.
So, I'm going to stop here.
I look forward to see you in this course blogs in growing with you through this course.
And I really do hope you will enjoy it.
So, let's move on



Comments

  1. Appreciate and waiting your next and sequence of topics in future. Plz be-concise in posts. Plz share course of contents.

    BR

    Umar Hashmi

    ReplyDelete
  2. It great. Really excited to learn about the basic of cyber security

    ReplyDelete
  3. ACTIVE & FRESH CC FULLZ WITH BALANCE
    Price $5 per each CC

    US FRESH, TESTED & VERIFIED SSN LEADS
    $1 PER EACH
    $5 FOR PREMIUM DATA

    CC DETAILS
    =>CARD TYPE
    =>FIRST NAME & LAST NAME
    =>CC NUMBER
    =>EXPIRY DATE
    =>CVV
    =>FULL ADDRESS (ZIP CODE, CITY/TOWN, STATE)
    =>PHONE NUMBER,DOB,SSN
    =>MOTHER'S MAIDEN NAME
    =>VERIFIED BY VISA
    =>CVV2

    SSN LEADS INFO
    First Name | Last Name | SSN | Dob | Address | State | City | Zip | Phone Number | Account Number | Bank NAME | DL Number | Home Owner | IP Address |MMN | Income

    Contact Us

    -->Whatsapp > +923172721122
    -->Email > leads.sellers1212@gmail.com
    -->Telegram > @leadsupplier
    -->ICQ > 752822040

    *You can buy for your specific states too
    *Payment in advance
    *Hope for the long term deal
    *Time wasters or cheap questioners please stay away
    *If you buy leads in bulk, I'll definitely negotiate
    *You can ask me for sample of Lead for demo

    US DUMP TRACK 1 & 2 WITH PIN CODES ALSO AVAILABLE

    ReplyDelete

Post a Comment

Popular posts from this blog

P3- Basic Bash Scripting

P2- Intro to Kali Linux

P4- Stages of Ethical Hacking