This repository contains notes, labs, demos, guides, research case studies, and certificate of completion for the Ethical Hacking Program (Henry Harvin Education).
The program provides a solid foundation in penetration testing, vulnerability exploitation, incident response, and reporting methodologies.
- 📄 01-introduction.md – Introduction to Ethical Hacking
- 📄 02-footprinting-reconnaissance.md – Footprinting & Reconnaissance
- 📄 03-scanning-networks.md – Scanning Networks
- 📄 04-enumeration.md – Enumeration
- 📄 05-system-hacking.md – System Hacking
- 📄 06-malware-threats.md – Malware Threats
- 📄 07-sniffing.md – Sniffing
- 📄 08-social-engineering.md – Social Engineering
- 📄 09-denial-of-service.md – Denial of Service
- 📄 10-session-hijacking.md – Session Hijacking
- 📄 11-web-application-hacking.md – Web Application Hacking
- 📄 12-sql-injection.md – SQL Injection
- 📄 13-wireless-hacking.md – Wireless Hacking
- 📄 14-cryptography.md – Cryptography
- 📄 15-reporting-mitigation.md – Reporting & Mitigation
- 🔍 labs/red-team-labs.md – Red Team practical labs
- ✅ labs/blue-team-defense.md – Blue Team defense strategies
- 📝 demo/demo-lab01.md – Reconnaissance & Scanning
- 📝 demo/demo-lab02.md – Web Application Exploitation
- 📝 demo/demo-lab03.md – Post-Exploitation & Reporting
- ⚙️ guides/setup-environment.md – Lab Setup Environment
- 📑 guides/penetration-testing-methodology.md – Pentest Methodology
- 📝 guides/reporting-guidelines.md – Reporting Guidelines
- 📑 extras/case-studies.md – Case Studies
- 📆 extras/timeline.md – Timeline of Attacks
- 📚 extras/resources.md – Additional Resources
- 📖 docs/index.md – Course Overview
- 📘 docs/syllabus.md – Course Syllabus
- 📘 docs/roadmap.md – Learning Roadmap
- 📘 docs/glossary.md – Glossary of Terms
- 📘 docs/references.md – References
Module | Screenshot |
---|---|
🏫 Module 1 | ![]() |
⭐ Module 2 | ![]() |
🎓 Ethical Hacking – Henry Harvin Education
This course enhanced my understanding of ethical hacking methodologies, vulnerability analysis, and defense strategies.
It balanced both Red Team exploitation techniques and Blue Team countermeasures, making it a valuable program for building practical cybersecurity skills.
Thành Danh – Red Team Learner & Security Researcher
- GitHub: @ngvuthdanhh
- Email: ngvu.thdanh@gmail.com
This project is licensed under the terms of the MIT License. See LICENSE for details.
© 2025 ngvuthdanhh. All rights reserved.