- Introduction 4
- Lecture1.1
- Lecture1.2
- Lecture1.305 min
- Lecture1.402 min
- Basics 5
- Lecture2.1
- Lecture2.204 min
- Lecture2.309 min
- Lecture2.406 min
- Lecture2.510 min
- Phishing 10
- Lecture3.1
- Lecture3.209 min
- Lecture3.308 min
- Lecture3.405 min
- Lecture3.507 min
- Lecture3.610 min
- Lecture3.709 min
- Lecture3.807 min
- Lecture3.906 min
- Lecture3.1008 min
- Phishing - Bypassing 2 / Multi Factor Authentication (2FA / MFA) 3
- Lecture4.107 min
- Lecture4.206 min
- Lecture4.309 min
- Accessing Cloud Server Desktop 2
- Lecture5.104 min
- Lecture5.210 min
- BitB - Browser In Browser Attack 6
- Lecture6.108 min
- Lecture6.205 min
- Lecture6.308 min
- Lecture6.405 min
- Lecture6.507 min
- Lecture6.6
- Mobile BitB - Mobile Friendly Phishing & 2FA Bypass 4
- Lecture7.109 min
- Lecture7.209 min
- Lecture7.307 min
- Lecture7.407 min
- Multi-BitB Attack 3
- Lecture8.109 min
- Lecture8.207 min
- Lecture8.309 min
- Hacking Web Browsers 8
- Lecture9.1
- Lecture9.213 min
- Lecture9.310 min
- Lecture9.412 min
- Lecture9.505 min
- Lecture9.607 min
- Lecture9.713 min
- Lecture9.805 min
- Command & Control Servers (C2 / C&C) 2
- Lecture10.102 min
- Lecture10.207 min
- Hacking Windows, Linux & Apple Mac OS 5
- Lecture11.108 min
- Lecture11.206 min
- Lecture11.310 min
- Lecture11.407 min
- Lecture11.505 min
- Post Exploitation With StarKiller 6
- Lecture12.109 min
- Lecture12.207 min
- Lecture12.306 min
- Lecture12.405 min
- Lecture12.505 min
- Lecture12.6
- Hacking Windows Using Discord as a C2 4
- Lecture13.105 min
- Lecture13.206 min
- Lecture13.304 min
- Lecture13.408 min
- Windows Post Exploitation via Discord 4
- Lecture14.106 min
- Lecture14.208 min
- Lecture14.306 min
- Lecture14.4
- Creating Windows Trojans 3
- Lecture15.1
- Lecture15.209 min
- Lecture15.303 min
- Creating Apple Mac OS & Linux Trojans 3
- Lecture16.106 min
- Lecture16.212 min
- Lecture16.311 min
- Advanced Malware Delivery 7
- Lecture17.1
- Lecture17.206 min
- Lecture17.306 min
- Lecture17.408 min
- Lecture17.503 min
- Lecture17.607 min
- Lecture17.709 min
- Bonus Section 1
- Lecture18.1
Introduction to Hacking Using The Cloud
This is the main course introduction lecture, it’ll introduce you to the main sections and topics of the course that will teach you how to use the cloud for hacking and explain what you’ll learn and how you’ll learn it.