Chapter 6:
Cyber-attacks and Malware
Chapter 7:
Cryptography
Advantages
of Cryptography
Types of Cryptography
Chapter 8:
Wireless and Network Exploitation
The
Dark Web Explained
Accessing the Dark Web
Conclusion
Hacking with Kali Linux
Chapter 1:
Introduction to Linux and Hacking
What is Linux?
Why is Linux the Best Operating System?
What is Hacking?
Who are Hackers?
Installation
of Linux Distros
Chapter 2:
Basic Linux Commands
How to Find Help while Using Linux?
User
Management in Linux
File Management in Linux
Process Management System
Chapter 3:
Basic Shell Programming
What is a Shell?
Built-in
Shell Commands
Fundamentals of Shell Programming
Chapter 4:
Hacking Procedure
Chapter 5:
Web Hacking Tools
Scanning of Webservers
Hacking a WordPress Website
Chapter 6:
Network Hacking Tools
What is a Network?
What is Routing?
Chapter 7:
Web Hierarchies and Cybersecurity Ethics
Why Do Hackers Fit Into Hierarchies?
Cybersecurity Ethics
What is Penetration Testing?
Chapter 8: