This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
Go to file
2018-02-16 00:06:04 -05:00
buffer_overflow_example Update README.md 2018-02-16 00:06:04 -05:00
capture_the_flag adding CTF information 2017-10-20 13:50:49 -04:00
cheat_sheets adding additional references 2018-02-13 16:21:27 -05:00
cloud_resources Rename Kali in AWS.md to README.md 2017-08-17 16:25:53 -04:00
exploit_development adding exploit exercises 2018-01-20 01:57:28 -05:00
fuzzing_resources Add fuzzing resources links 2017-09-19 22:29:26 -04:00
metasploit_resources adding metasploit info 2018-01-17 22:57:47 -05:00
mobile_security adding reverse engineering and mobile security references 2017-12-25 23:57:11 -05:00
osint adding OSINT resources 2018-01-17 22:45:47 -05:00
pen_testing_reports Rename public_reports.md to README.md 2017-08-17 16:26:15 -04:00
recon adding recon info 2018-01-20 00:14:08 -05:00
reverse_engineering adding exploit development references 2017-12-26 00:11:34 -05:00
useful_commands_and_scripts Create reverse_shells.md 2018-01-18 18:57:24 -05:00
virl_topologies Renumber VIRL topology files as reflected in the actual lesson numbers 2018-01-18 17:41:38 -05:00
vulnerable_servers updating webgoat information 2018-02-14 12:57:46 -05:00
wireless_resources Update z-wave.md 2018-01-04 22:08:20 -05:00
README.md Update README.md 2017-11-06 15:21:45 -05:00

The Art of Hacking Series

The Art of Hacking is a series of video courses that is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and the fundamentals of ethical hacking and security penetration testing techniques. These video courses provide step-by-step real-life scenarios. You will see first hand how an ethical hacker performs initial reconnaissance of a victim and assess systems and network security controls security posture. This website has been created to provide supplemental material to reinforce some of the critical concepts and techniques that the student has learned and links a GitHub repository that hosts scripts and code that help you build your own hacking environment, examples of real-life penetration testing reports, and more.

The following are the different video courses that will be part of the Art of Hacking series:

  • Security Penetration Testing (The Art of Hacking Series) LiveLessons
  • Enterprise Penetration Testing and Continuous Monitoring (the Art of Hacking Series)
  • Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series) LiveLessons
  • Advanced Web Applications Penetration Testing (The Art of Hacking Series) LiveLessons
  • Advanced Network Hacking (The Art of Hacking Series) LiveLessons

These courses serve as comprehensive guide for any network and security professional who is starting a career in ethical hacking and penetration testing. It also can help individuals preparing for the Offensive Security Certified Professional (OSCP), the Certified Ethical Hacker (CEH), and any other ethical hacking certification. This course helps any cyber security professional that want to learn the skills required to becoming a professional ethical hacker or that want to learn more about general hacking methodologies and concepts.

These video courses are published by Pearson, but this GitHub repository is maintained and supported by the lead author of the series (Omar Santos).