1. Introduction To Course
2. Labs Prepration
3. Carding
4. Malwares Introduction
5. Trojans Prectical
6. Trojan Icon Changing
7. Introduction to VPS
8. Hacking From Internet (VPS)
9. AV Working
10. AV Bypassing
11. Ransomwares
12. Malware Forensics
13. Trojans with Science
14. Silent Exploits
15. Phishing Basics
16. Phishing Manually
17. Phishing Hosting
18. Email Extraction
19. Cat Phishing
20. Identity Hiding
21. Identity Hiding 2
22. Identity Hiding 3
23. Calling Scams
24. Tips and Experience
25. Social Engineering
26. Social Engineering 2
27. Social Engineering 3
28. SMTP Introduction
29. Cpanel SMTP
30. Next Steps in Black Hat