My Introduction
Welcome to "Heath Adam's
Practical Ethical Hacking Blogs".
I am Sheema and I am a working lady. Currently I am doing the online course from Udemy by
"Heath Adams" and the course name is” Practical Ethical Hacking-
Complete Course".
So, I decided to write all
what I study to share with you guys on a regular basis.
I'm excited for this journey
that we're going to be taking together.
So, a really quick 'Who am I?
I am a Working lady, a student and a Software Engineer that is turning into a Cyber Security
Professional.
I am interested in this field
and so I am doing this online course.
Else my hobbies are
watching movies, listening to songs, giving time to my family, doing makeup etc. etc.
I do have Social Media
accounts that are below
So, coming back to the course,
in this course Blogs, we are not going to cover the things that we don't really
want to know, we are going to touch the base on a lot of things that are
necessary for a person to start his/her career in Cyber Security field.
I will be sharing the Course
Outline with you guys, And the most excited thing about this course is Active
directory penetration testing.
And that's something that is
such a critical knowledge point that you need to know to be a penetration
tester such as ethical hacker, And nobody talks about it.
So right now, we are in the introduction.
We are going to talk about
effective note keeping and why you should take good notes. We will be studying Networking,
Kali Linux and Python, And we're going to cover those because they are
important for your foundations to be a good ethical hacker and penetration tester.
So, Once we get out of the foundational section of this course,
we're going to talk about External Network Hacking which is what you see in most courses.
Then we're going to move on
to this Active Directory Exploitation where we will build out an Active Directory lab and we will exploit it.
If you have no idea of Active
Directory is that's OK.
We're going to cover that later in the course. But it is so
fun and such a great experience.
I'm really looking forward to
that. On top of that, We're going to talk about Web Application Exploitation.
We'll talk about common
attacks that you're going to see. We’ll walk through Wireless Exploitation.
We'll also talk about report
writing and common legal documentation.
I'm going to take you through the documents and we'll cover
report writing on how to write a report and I'll provide you with a sample
report.
Finally, we're going to wrap up the course with career advice.
So, I'm going to stop here.
I look forward to see you in this course blogs in growing
with you through this course.
And I really do hope you will enjoy it.
So, let's move on
Superb
ReplyDeleteAppreciate and waiting your next and sequence of topics in future. Plz be-concise in posts. Plz share course of contents.
ReplyDeleteBR
Umar Hashmi
Good job .. 👍🏻
ReplyDeletega zo door
ReplyDeleteIt great. Really excited to learn about the basic of cyber security
ReplyDeleteI'm interested
ReplyDeleteNice & keep it up
ReplyDeleteACTIVE & FRESH CC FULLZ WITH BALANCE
ReplyDeletePrice $5 per each CC
US FRESH, TESTED & VERIFIED SSN LEADS
$1 PER EACH
$5 FOR PREMIUM DATA
CC DETAILS
=>CARD TYPE
=>FIRST NAME & LAST NAME
=>CC NUMBER
=>EXPIRY DATE
=>CVV
=>FULL ADDRESS (ZIP CODE, CITY/TOWN, STATE)
=>PHONE NUMBER,DOB,SSN
=>MOTHER'S MAIDEN NAME
=>VERIFIED BY VISA
=>CVV2
SSN LEADS INFO
First Name | Last Name | SSN | Dob | Address | State | City | Zip | Phone Number | Account Number | Bank NAME | DL Number | Home Owner | IP Address |MMN | Income
Contact Us
-->Whatsapp > +923172721122
-->Email > leads.sellers1212@gmail.com
-->Telegram > @leadsupplier
-->ICQ > 752822040
*You can buy for your specific states too
*Payment in advance
*Hope for the long term deal
*Time wasters or cheap questioners please stay away
*If you buy leads in bulk, I'll definitely negotiate
*You can ask me for sample of Lead for demo
US DUMP TRACK 1 & 2 WITH PIN CODES ALSO AVAILABLE