Introduction

In this tutorial, we will take you through the various concepts of Ethical Hacking and explain how you can use them in a real-time environment. You will learn all about Ethical hacking with loads of live hacking examples to make the subject matter clear. You will learn how to search find and exploit various vulnerability's as well as how to defend against them.

This playlist of videos should help teach you a good amount of offensive and defensive strategy's and techniques.

What are the requirements?

A PC (WiFi/Bluetooth required for some stuff)

Basic technical knowledge is a must ( Running programs etc)

This series will many be using Linux so a Linux install or device (We'll cover this in the series as well as alternatives)

What is the target audience?

Anyone who wants to learn how to attack and defend them self's from cyber threats

When are the streaming sessions (streaming schedule)?

Streaming should occur regular on Saturday's at 4PM (EST) with other off topic streams on Tuesday at 2:00PM (EST)