Skip to content

Latest commit

Β 

History

History
111 lines (78 loc) Β· 8.07 KB

File metadata and controls

111 lines (78 loc) Β· 8.07 KB

YouTube Playlist

--> Playlist content will keep on updating and it contains or will contain topics related to 
  1. Cryptography --> Done
  2. Lab Setup + Network and OS Fundamentals --> Done
  3. System Security --> Basics Done --> Higher level topics will be added with Labs
  4. Network Security --> To Be Released
  5. Web Application Security --> To Be Released
  6. Android Application Security --> To Be Released
  7. Cloud Fundamentals --> To Be Released
  8. Cloud Security --> To Be Released
πŸ“Ί Fundamentals
Understanding CIA Triad (Confidentiality, Integrity, Availability) Common Security Standards
!Understanding CIA Triad (Confidentiality, Integrity, Availability)](https://youtu.be/J-c3SydXA4A?si=_NCr9wewAgnTi11V) Common Security Standards
Different Teams Types of Testing
Different Teams Types of Testing
Five Phase of Hacking Common Terms
Five Phase of Hacking Common Terms
πŸ“Ί Cryptography
πŸŽ₯ Encoding - Decoding πŸŽ₯ Encrypption - Decryption
Encoding - Decoding Encrypption - Decryption
πŸŽ₯ Video 3 πŸŽ₯ Digital Signatures and Certificates
Hashing Digital Signatures and Certificates
πŸ“Ί Lab Setup + Network and OS Fundamentals
Windows Installation in VMWare Pro Kali Linux Installation in VMWare Pro
Windows Installation in VMWare Pro Kali Linux Installation in VMWare Pro
Linux Introduction Part 1 Linux Introduction Part 2
Linux Introduction Part 1 Linux Introduction Part 2
Introduction to Network and Topology Intra Network Packet Transmission
Introduction to Network and Topology Intra Network Packet Transmission
Inter Network Packet Transmission IP Address Structure and there Classification
Inter Network Packet Transmission IP Address Structure and there Classification
Public and Private IP Allocation Subnatting & Supernatting
Public and Private IP Allocation Subnatting & Supernatting
πŸ“Ί Basic Malware and System Exploitation Techniques
Windows Lock Screen Bypass Malware Part 1
Windows Lock Screen Bypass Malware Part 1
Malware Part 2 Malware Part 3
Malware Part 2 Malware Part 3
Malware Part 4 Network Connection and Traffic
Malware Part 4 Network Connection and Traffic
Memory Stack Introduction Part 1 Memory Stack Introduction Part 2
Memory Stack Introduction Part 1 Memory Stack Introduction Part 2
Memory Corruption and Buffer Overflow Eternal Blue or MS-17-010 or CVE-2017-0144
Memory Corruption and Buffer Overflow Eternal Blue or MS-17-010 or CVE-2017-0144

🎯 Stay Updated with Pentesting-Club

Subscribe to Pentesting-Club YouTube Channel for:

  • πŸ”΄ Live penetration testing sessions
  • πŸ› οΈ Advanced hacking techniques and tutorials
  • πŸ† CTF walkthroughs and cybersecurity challenges
  • πŸ“š In-depth security research and tool reviews
  • πŸ’‘ Real-world penetration testing scenarios

Follow us for the latest in cybersecurity education and practical penetration testing content!


This repository contains educational content for Certified Ethical Hacker (CEH) preparation. All techniques and payloads are provided for educational and authorized testing purposes only. Users are responsible for complying with applicable laws and regulations.