Thank you so much for watching. Please consider subscribing. It's as easy as clicking this link: ru-vid.com Part 2: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-sH4JCwjybGs.html Full Course: academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course All Course Resources/Links: github.com/Gr1mmie/Practical-Ethical-Hacking-Resources Wireless Adapter: amzn.to/3WdyJLc
Hi Heath, i love all your Videos , but the most your character, your amazing. Is there a full course of Low integrity level for Win and Linux priv esc in your Contents or planed?
I’m a clean slate here 29 years old. Been around computers my entire life and I have tried looking into this subject a few times but was always discouraged trying to teach myself I look foward to using this course and trying to learn as much as I can
I am 4 hours in and this course is fantastic. The way he explained subnetting was awesome even for someone like me who has a networking degree and an IT background.
@@nishantdalvi9470 what I personally do when I’m struggling with something along the lines of networks is RU-vid whatever I’m struggling with and adding professor Messer at the end. Ex OSI model professor Messer.
finished part one in like a week, everyday about an hour and i have to say if you don't document and record and practice everything you will eventually forget all the information that you've learnt. thanks man, awesome content
@@funnytime3358 I only watched 2 minutes but he said right in the beginning that it doesn't matter who you are or what your background is so I think you can just go ahead and watch this if you didn't already
@@Wkashif1111 is course k bd Aap hacking krny lag jao Aap pr hai k Aap ne course kitna seriously lia and this cousre is about basics like the things which you need to know in order to do hacking
The subnetting videos, just wow. I did a networking degree 12 years ago and have hated subnetting ever since. After your video I feel much more comfortable with it. Thanks!
Just finishing subnet pt1 and found your method so easy, for context about 7yrs ago I did an Open University course on CISCO networking and could not get my head around subnetting, I struggled for weeks with it.. your explanation and cheat sheet had me solving it in minutes.. I am truly stunned.. I'm now so excited for the rest of your course. Thank you.
Thank you so much for this course. Here is the mnemonic I learned to remember the OSI Layers L1- Physical - Please L2 - Data Link - Do L3 - Network - Not L4 - Transport - Tell L5 - Session - Secret L6 - Presentation - Passwords L7 - Application - Anytime
hey bro, i dont have an IT background but i want to learn ethical hacking should i be doing this course, i have zero knowledge about coding networking or hacking
Could you pls expand this like what do you mean by baseline of computer science and also about networking which topic should I study as a beginner@@incredibletrader89
Looking for a career change and was pointed in the CEH direction. I sent this video to my friend and he told me you're putting out a lot of good information. I want to get my head around it before I start classes and am grateful for the resource. 🙏
Yea places like russia dont expedite and allow havking on foreign systems hence why they have some of thw top in the world. To really really really learn it your gonna have to risk breaking the law. Unless you want to just always run utilities. Thats not bad, just in US hard to really get into it without uncle sam fucking ya so hinders learning at fullest capability.
I'm a compliance officer on the medical side, and winding down my career looking for my next instead of retirement. thank you for putting this together!!
Thank you for all your work and for sharing it. What I appreciate most is that it brings all we need in the same place: OS, networks, Python and so on. So you span the entire basic knowledge of a '23 IT beginner (and experienced user, too, that's important to be said). Just one thing for MacOS users : you can now use VMWare on a M1 or M2 (Silicon) ship equipped Mac; do not use Virtual Box on these new Macs, it's not working well enough at the moment of this comment. Great job M. Cyber Mentor!
Even if you don't want to become a penetration tester, or just don't have the commitment to start on part 2, this video is a amazing course for networking and general usage of linux and I recommend you use it as such.
The Cyber Mentor has done it again! This 15-hour course on ethical hacking is packed with valuable information and insights. The instructor's clear explanations and hands-on approach make learning easy and enjoyable. I highly recommend this course to anyone looking to get into ethical hacking, it's a game-changer! 😁
Brother im a highschool dropout.i am getting so much interested in coding and cyber security stuff frof few weeks.. But im not good at maths So i cannot decide between cyber security and web dev? Can u hep?
This comment blew my mind. I’ve been repeating it to myself as a mantra whenever I get discouraged or frustrated when things seem to difficult for me. Thanks for sharing this with us man, I really appreciate it
Wow Man, I had CCNP last year, and I learned Python and used it to build some AI Projects, I can't even believe how easy this tutorial is for me, and I enjoy every second of it. keep up the awesome Work👍🏻
brand new to this but have been wanting to get started for a few years tbh. really had no idea what i wanted to do with my life yet in college. Tech savvy but no official IT background of any kind. I think this is a fresh start for me plan on getting this done in the next couple days
I'm a bit over 4 hours in. I've taken a handful of Udemy Classes on several of these subjects and it never sunk in. I'm a person that has to physically do it to learn. This is fantastic! I'm following you on LinkedIn too. Thank you!
Just started watching this video and I am not one who likes to study by watching long courses and I have to say from a guy who has 0 knowledge about ethical hacking, You made love this subject and I really appreciate you and your time doing this, I hope you have more of these on the way🙌🙏
"Wow, I just finished watching your tutorial on RU-vid, and I'm really impressed! Your explanations are clear, and you break down complex concepts in a way that's easy to understand. Your enthusiasm for cybersecurity is contagious, and it's clear that you're passionate about helping others learn and succeed in this field. Keep up the fantastic work, and I can't wait to watch more of your content!"
My interest lies in defending against cyber threats and ensuring the safety of digital assets so the video provided valuable insights into cybersecurity .
The hilarious part here is that I downloaded everything figured everything out and went through the hell of trying to just do it through forums and AI. I thought that I needed to at least have some sort of base to even begin a class. Now here I am almost 4hours in and I feel I'm finally into new territory! Haha. I was learning but I guess this needs to be marketed even more to newbies! This field is intimidating to get into.
I didn’t realize how easy it was to do this. I’m learning a lot. Thank you so much. You’re a great teacher. I’m glad you’re doing it for the right reasons. I’m not fond of hackers who invade your privacy and etc to people. Im hoping I can learn fast so I can rid of my hackers lol. You really made my day. I got something to look forward to for a while! God bless you man.
Are you familiar with installing Kali Linux on Mac? I’ve been stuck in the same place for 3 months now but I really want to learn from this course. When I follow the set up instructions from this video it doesn’t work for me. Any advice would be greatly appreciated.
@@samr3429 hmm, well from what your saying that it isn’t working it’s more than likely your installing the wrong one . There’s a 64 bit version and a 32 bit. I’ve never had a Mac in my entire life. I’ve used them though but not long. So go to your control panel go to system and security then go to system it will let you know which version you have, if 64 get the 64bit. If the problem persists let me know. I’d recommend downloading virtual box as well. Also I’d just google how to do the rest. If for some reason you can’t find your systems specs. Just google it, but usually if you type in system in the search bar it should show up or in your control panel.
Noticed this thing with the PEMDAS operator, I worked out the equation the 'wrong way', solving operators left to right without considering the whole.. and got 50. Then I did it again using PEMDAS, and interesting enough, it still worked out to be 50 again. Math is weird I absolutely loved this course !! THANK YOU SM!!
bro can you answer my 2 questions 1. is this course cover all the concepts of ethical hacking 2. what is the level of this course i mean is this only a beginner level type or beginner to advance level type course , i asked you bcz you graduated from cyber security program so only can give best answer to these questions , it would help a a lot if you answer .
@@RyanZogheib are you sure this is for beginner because i don't understand half the stuff he's doing, especially when he gets to the part of starting and stopping services i just stopped watching there, i'm so confused
2 hours in and this is awesome so far. It should be mentioned that Windows Defender will scan the kali download and may block it because of 'viruses'. Disabling real time protection in Defender until the download is complete will get you past that point. Then you can re-enable it
I was 5 hours into your 12 hour one lol I’m going to start again for the hell of it cause I enjoy listening to you talk about this stuff and I’m following along at my own pace anyways 🎉
same, started with 2019 and was 8h in when i changed pc and all that stuff, then came part 2 i was 9h in that one and now this ones coming, maybe at some point i can get through one from start to end
@@L0G1C4LLY I need a friend we can work together through this journey cos I totally alone. It'll be easier to have someone to share ideas with and push each other bro
Great vid. Im basically a total noob... with a lot of windows experience but lately I've been spending a lot of time with Kali Linux..and watching vids like this. Im a journeyman plumber but I'm really interested in Hacking in general...Thinking about going for some kind of certificate in cyber security but i dont know which one to start with.
Hey man I know it's been three months but I just seen your comment and knew of a video that will help you alot ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-uTAaFExLgwQ.html this dude is great and gives a whole roadmap of certifications you need to get hired and generally help information wise.
@@safeplace3652can you really get a job like that without a degree though? I keep hearing people go "oh sure you don't need a degree to go into IT fields", but then you start doing research and looking at job postings and they all say to have a bachelors, some even want a master's degree
@TCMSecurityAcademy The backtick ` is a typographical mark used mainly in computing. It is also known as backquote, grave, or grave accent. You've taught me much more, but i thought i could let you know the proper term for the character/symbol! Thanks!
Love your vids man i am a 15 year old boy who is really into computers and i really understood the subnetting part and the rest . Keep it up!. This course is amazing. The way you explain is simply great.
when you talked about virtual machine and having a problem if youre using 8g ram it was over for me, but for someone who is seeing all of this for the first time you teach so well and now i understand subnetting whichis wow so thanks for what i could get from this
Thank you for sharing your knowledge! This is an amazing resource. I have encountered some of the information before in my computer science university courses. But nobody explained it to me in such a clear and easy to understand way. It is great that you explain the basics and how to install certain programs, in this way it is really possible for anyone to follow this course.
Omg this is awesome resource. I've looked up other stuff on your web and will be exploring everything soon. Only issue I have is that I'm kinda weak in networking, it's been a while since I worked with basic networking. Can you guys give any guidance for something like networking from 0 ? I have couple of pcs laying around, routers and couple of switches that I can play with but don't know where to start with networking and how deep I need to dig in for cyber security career. Not a noobie in IT, been developer for around 8 years active right now but never worked with networking and rarely get any chance to do any tinkering on the servers :)
Since late 90s i was listening about hacking ,ports.handshakes....etc and since then i was always wanted to have someone just to put all tha thinks on a place and xplain ..no for harm anyone .not to intrude.just for curiosity of that new world that u could interact with the machines in a most engineering way!!Thnaks a lot for these courses that make my dream come true!!!And also the way you explain them is the perfect way for me!! thanks a lot man!!
Hi Bro!!! You have great content! Great educational program! But I am having difficulty. My browser's neural network can't translate such long videos. Please divide these wonderful lessons into segments of no more than 4 hours. In this case, you will make thousands of your non-English speaking followers happy!
I can't understand why they're giving tech or IT related courses for free like this , is it just only they're bored or for the views. I really appreciate courses like this. 😊
He gets a lot of views on this video because its a good course. With these views he gets ad money, but more importantly he advertises his paid courses. hat People see that this video is good and come to the conclusion that the paid courses are even better, so they buy his paid courses. What he gains from this is adsense money and more people paying for his more advanced paid courses.
A good way to memorize the 7 Osi layers Please - Physical Layer Dont- Data Layer Never-Network Layer Touch- Transport Layer Sassy's- Session layer Purple- Presentation layer Apple- Application Layer
Keep in mind that a proper login screen will ask for a password, even if the user doesn't exist. That prevents user enumeration, which is the exploit he's showing us late in this part. Likewise, the forgot password screen might say something like, "If you have an account with us, then we've sent you a password reset email to your backup email address." That way even if that email doesn't have an account, people won't know. For reference, as a software engineer, that's how I make sure the login screens I create or use, respond.
If it helps anyone else, I ran into an issue where my Virtual Machine wouldn't run because Virtualization wasn't turned on. All I had to do was go into BIOS and under configuration, toggle virtualization technology to on.
I studied a bit of python last year. Once we got into python i just made a whole ass program that assigns an order to a customer........God i love coding Thanks for reigniting my joy for this
@@kahlilb9602 i dont even know just tryna learn more bro and have up to date knowledge but if this is practically newest/best info ill soak up the game
Thank u sir for these videos, I watched 4 hrs of 15 hrs your video of 2019 and then u uploaded this video here , so I wanted to ask what is the difference between these 2 videos u recently uploaded and that 2019 course video. I should keep watching that or should I start watching these videos?
Heath thank you for this resource, actually I was in attendance last year for the PNPT that you were conducting live, but was not able to finish the course. If you do not mind I will download this so that I can locally teach myself until it is done. Much appreciation again.