001 Introduction 002 What is Ethical hacking and Penetration testing 001 Kali Linux 002 Operating systems Overview 003 Concepts on Operating systems 004 Installing Operating Systems 005 Installing vmware tools 006 Configuring Kali Linux 007 Installing Kali Linux on MacBook 001 What is Footprinting 002 Footprinting Objectives 003 Footprinting Tools 004 Introduction to Google Hacking 005 Nuts and Bolts of Google Hacking 006 Google Hacking Processes 007 Who is lookup 008 DNS footprinting Overview 009 DNS footprinting Functions and Process 010 Determining Operation System 011 Introduction to Phishing Attacks 012 Phishing Attacks Details 013 Connecting information database 014 Introduction to Nmap and ZenMap 015 Nmap 016 ZenMap