- Introduction 4
- Lecture1.1
- Lecture1.2
- Lecture1.305 min
- Lecture1.402 min
- Basics 5
- Lecture2.1
- Lecture2.204 min
- Lecture2.309 min
- Lecture2.406 min
- Lecture2.510 min
- Phishing 10
- Lecture3.1
- Lecture3.209 min
- Lecture3.308 min
- Lecture3.405 min
- Lecture3.507 min
- Lecture3.610 min
- Lecture3.709 min
- Lecture3.807 min
- Lecture3.906 min
- Lecture3.1008 min
- Phishing - Bypassing 2 / Multi Factor Authentication (2FA / MFA) 3
- Lecture4.107 min
- Lecture4.206 min
- Lecture4.309 min
- Accessing Cloud Server Desktop 2
- Lecture5.104 min
- Lecture5.210 min
- BitB - Browser In Browser Attack 6
- Lecture6.108 min
- Lecture6.205 min
- Lecture6.308 min
- Lecture6.405 min
- Lecture6.507 min
- Lecture6.6
- Mobile BitB - Mobile Friendly Phishing & 2FA Bypass 4
- Lecture7.109 min
- Lecture7.209 min
- Lecture7.307 min
- Lecture7.407 min
- Multi-BitB Attack 3
- Lecture8.109 min
- Lecture8.207 min
- Lecture8.309 min
- Hacking Web Browsers 8
- Lecture9.1
- Lecture9.213 min
- Lecture9.310 min
- Lecture9.412 min
- Lecture9.505 min
- Lecture9.607 min
- Lecture9.713 min
- Lecture9.805 min
- Command & Control Servers (C2 / C&C) 2
- Lecture10.102 min
- Lecture10.207 min
- Hacking Windows, Linux & Apple Mac OS 5
- Lecture11.108 min
- Lecture11.206 min
- Lecture11.310 min
- Lecture11.407 min
- Lecture11.505 min
- Post Exploitation With StarKiller 6
- Lecture12.109 min
- Lecture12.207 min
- Lecture12.306 min
- Lecture12.405 min
- Lecture12.505 min
- Lecture12.6
- Hacking Windows Using Discord as a C2 4
- Lecture13.105 min
- Lecture13.206 min
- Lecture13.304 min
- Lecture13.408 min
- Windows Post Exploitation via Discord 4
- Lecture14.106 min
- Lecture14.208 min
- Lecture14.306 min
- Lecture14.4
- Creating Windows Trojans 3
- Lecture15.1
- Lecture15.209 min
- Lecture15.303 min
- Creating Apple Mac OS & Linux Trojans 3
- Lecture16.106 min
- Lecture16.212 min
- Lecture16.311 min
- Advanced Malware Delivery 7
- Lecture17.1
- Lecture17.206 min
- Lecture17.306 min
- Lecture17.408 min
- Lecture17.503 min
- Lecture17.607 min
- Lecture17.709 min
- Bonus Section 1
- Lecture18.1
Teaser
The goal of this lecture is to give you an idea of what you’ll be capable of by the end of the course. It’s going to showcase 3 different professional hacking techniques that you will learn in this course to launch proper phishing campaigns, steal login information, bypass 2FA and MFA (two and multi factor authentication), hack web browsers, access their exact location, access system resources like the web cam, and finally gain full remote control over any computer that is connected to the internet, and all of this will be done from within the cloud.
Introduction to Hacking Using The Cloud
Next