# The Cyber Mentor

## [My Entrepreneurial Journey](https://www.youtube.com/playlist?list=PLLKT__MCUeiyuEcu7PCeosDmzgfThnt9j)

1. [My Entrepreneurial Journey - Episode 1: Quitting My 6 Figure Cybersecurity Job to Start a Business](https://www.youtube.com/watch?v=5JI9c-pF-xQ\&list=PLLKT__MCUeiyuEcu7PCeosDmzgfThnt9j\&index=2\&t=0s) (33:30)
2. [My Entrepreneurial Journey - Episode 2: Week One of Business Ownership](https://youtu.be/OKmVKaETFTc) (26:55)

## [Hacking Live Streams](https://www.youtube.com/playlist?list=PLLKT__MCUeizPO6yRP3trZnH1SiEMkni4)

1. [Hacking Live Stream: Episode 1 - Kioptrix Level 1, HackTheBox Jerry, and Career Q\&A / AMA](https://youtu.be/zO6NdOjgwY0) (3:10:33)
2. [Hacking Live Stream: Episode 2 - HackTheBox Active, Vulnserver Buffer Overflow, and Career Q\&A / AMA](https://www.youtube.com/watch?v=uByoC5wv00Q\&list=PLLKT__MCUeizPO6yRP3trZnH1SiEMkni4\&index=3\&t=0s) (1:56:33)
3. [Hacking Live Stream: Episode 3 - Hack The Box Blue, Devel, and Career Q\&A / AMA](https://www.youtube.com/watch?v=6Iu13SLN2Sw\&list=PLLKT__MCUeizPO6yRP3trZnH1SiEMkni4\&index=4\&t=0s) (1:34:08)
4. [Introductory Exploit Development Live Stream - x86 Assembly Primer and SEH Overflows w/ Ruri](https://www.youtube.com/watch?v=cpmdqMbEJyA\&list=PLLKT__MCUeizPO6yRP3trZnH1SiEMkni4\&index=5\&t=0s) (4:56:19)
5. [Exploit Development Live Stream Part 2- More Assembly and some Egghunting w/ Ruri](https://youtu.be/d119EhY8VD8) (3:33:29)
6. [Drunk Hacking My Own Website (Web App 101)](https://www.youtube.com/watch?v=mCINqXVoeH4\&list=PLLKT__MCUeizPO6yRP3trZnH1SiEMkni4\&index=7\&t=0s) (2:46:11)

## [Zero to Hero: A Practical Network Penetration Testing Course](https://www.youtube.com/playlist?list=PLLKT__MCUeiwBa7d7F_vN1GUwz_2TmVQj)

1. [Zero to Hero Pentesting: Episode 1 - Course Introduction, Notekeeping, Introductory Linux, and AMA](https://youtu.be/qlK174d_uu8) (4:08:48)
2. [Zero to Hero Pentesting: Episode 2 - Python 101](https://youtu.be/egg-GoT5iVk) (2:49:18)
3. [Zero to Hero Pentesting: Episode 3 - Python 102, Building a Terrible Port Scanner, and a Giveaway](https://www.youtube.com/watch?v=3GriwyvJzio\&list=PLLKT__MCUeiwBa7d7F_vN1GUwz_2TmVQj\&index=4\&t=0s) (2:34:07)
4. [Zero to Hero Pentesting: Episode 4 - Five Phases of Hacking + Passive OSINT](https://www.youtube.com/watch?v=ChdUC32lsYQ\&list=PLLKT__MCUeiwBa7d7F_vN1GUwz_2TmVQj\&index=5\&t=0s) (3:04:10)
5. [Zero to Hero Pentesting: Episode 5 - Scanning Tools (Nmap, Nessus, BurpSuite, etc.) & Tactics](https://youtu.be/t9aAhuG0LkE) (3:07:43)
6. [Zero to Hero Pentesting: Episode 6 - Enumeration (Kioptrix & Hack The Box)](https://www.youtube.com/watch?v=BWE51iudbPo\&list=PLLKT__MCUeiwBa7d7F_vN1GUwz_2TmVQj\&index=7\&t=0s) (2:48:34)
7. [Zero to Hero Pentesting: Episode 7 - Exploitation, Shells, and Some Credential Stuffing](https://www.youtube.com/watch?v=gGNjDwnXgsg\&list=PLLKT__MCUeiwBa7d7F_vN1GUwz_2TmVQj\&index=8\&t=0s) (2:47:50)
8. [Zero to Hero: Week 8 - Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat](https://www.youtube.com/watch?v=_OseTyfXr3Q\&list=PLLKT__MCUeiwBa7d7F_vN1GUwz_2TmVQj\&index=9\&t=0s) (2:16:45)
9. [Zero to Hero: Week 9 - NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more](https://www.youtube.com/watch?v=QvMeLoyS944\&list=PLLKT__MCUeiwBa7d7F_vN1GUwz_2TmVQj\&index=10\&t=0s) (2:08:17)
10. [Zero to Hero: Episode 10 - MS17-010/EternalBlue, GPP/cPasswords, and Kerberoasting](https://www.youtube.com/watch?v=6rZddmB0fug\&list=PLLKT__MCUeiwBa7d7F_vN1GUwz_2TmVQj\&index=11\&t=0s) (1:32:55)
11. [Zero to Hero: Week 11 - File Transfers, Pivoting, and Reporting Writing](https://www.youtube.com/watch?v=MxjIDoGsGCQ\&list=PLLKT__MCUeiwBa7d7F_vN1GUwz_2TmVQj\&index=12\&t=0s) (1:25:47)

## [Windows AD Lab Setup](https://www.youtube.com/playlist?list=PLLKT__MCUeiycd-_VvfM1xI9t4uEV0g8i)

1. [Installing Windows Server 2016 on VMWare in 5 Minutes](https://www.youtube.com/watch?v=lS9Eulfpffg\&list=PLLKT__MCUeiycd-_VvfM1xI9t4uEV0g8i\&index=2\&t=0s) (4:42)
2. [Active Directory Exploitation - LLMNR/NBT-NS Poisoning](https://youtu.be/Fg2gvk0qgjM) (8:17)

## [Networking for Ethical Hackers](https://www.youtube.com/playlist?list=PLLKT__MCUeiyUKmYaakznsZeU4lZYwt_j)

1. [Networking for Ethical Hackers - TCP, UDP, and the Three-Way Handshake (Re-Up)](https://youtu.be/4Kho3Eeyx1U) (7:24)
2. [Networking for Ethical Hackers - Network Subnetting (Re-Up)](https://www.youtube.com/watch?v=1892iszqnCg\&list=PLLKT__MCUeiyUKmYaakznsZeU4lZYwt_j\&index=3\&t=0s) (21:06)
3. [Networking for Ethical Hackers - Network Subnetting Part 2: The Challenge (Re-Up)](https://www.youtube.com/watch?v=ap5_OArxgMI\&list=PLLKT__MCUeiyUKmYaakznsZeU4lZYwt_j\&index=4\&t=0s) (6:57)
4. [Networking for Ethical Hackers - Building A Basic Network with Cisco Packet Tracer (Re-Up)](https://youtu.be/NhxXrDLxlk0) (19:09)

## [Beginner Linux for Ethical Hackers](https://www.youtube.com/playlist?list=PLLKT__MCUeiwfK18Io6kvwrrhqQyQnV5W)

1. [Beginner Linux for Ethical Hackers - Navigating the File System](https://youtu.be/r8giT8BBdw8) (12:20)
2. [Beginner Linux for Ethical Hackers - Users and Privileges](https://youtu.be/Sl60jGmr8e0) (9:40)
3. [Beginner Linux for Ethical Hackers - Common Network Commands](https://www.youtube.com/watch?v=CxzdU71yiaY\&list=PLLKT__MCUeiwfK18Io6kvwrrhqQyQnV5W\&index=4\&t=0s) (6:08)
4. [Beginner Linux for Ethical Hackers - Viewing, Creating, and Editing Files](https://youtu.be/Lhubd_vrBjU) (6:16)
5. [Beginner Linux for Ethical Hackers - Installing and Updating Tools](https://youtu.be/k6isN-5-qdM) (7:53)
6. [Beginner Linux for Ethical Hackers - Controlling Kali Services](https://youtu.be/qEyJzThzJ6c) (4:13)
7. [Beginner Linux for Ethical Hackers - Scripting with Bash](https://www.youtube.com/watch?v=GENx_pXo7Co\&list=PLLKT__MCUeiwfK18Io6kvwrrhqQyQnV5W\&index=8\&t=0s) (19:15)

## [Buffer Overflows Made Easy](https://www.youtube.com/playlist?list=PLLKT__MCUeix3O0DPbmuaRuR_4Hxo4m3G)

1. [Buffer Overflows Made Easy - Part 1: Introduction](https://youtu.be/qSnPayW6F7U) (8:54)
2. [Buffer Overflows Made Easy - Part 2: Spiking](https://www.youtube.com/watch?v=3x2KT4cRP9o\&list=PLLKT__MCUeix3O0DPbmuaRuR_4Hxo4m3G\&index=3\&t=0s) (10:29)
3. [Buffer Overflows Made Easy - Part 3: Fuzzing](https://youtu.be/FCIfWTAtPr0) (6:27)
4. [Buffer Overflows Made Easy - Part 4: Finding the Offset](https://www.youtube.com/watch?v=GqwyonqLYdQ\&list=PLLKT__MCUeix3O0DPbmuaRuR_4Hxo4m3G\&index=5\&t=0s) (5:42)
5. [Buffer Overflows Made Easy - Part 5: Overwriting the EIP](https://www.youtube.com/watch?v=Wh9wRKBzajo\&list=PLLKT__MCUeix3O0DPbmuaRuR_4Hxo4m3G\&index=6\&t=0s) (3:41)
6. [Buffer Overflows Made Easy - Part 6: Finding Bad Characters](https://youtu.be/uIFYNVqpZ0k) (6:25)
7. [Buffer Overflows Made Easy - Part 7: Finding the Right Module](https://www.youtube.com/watch?v=k9D9RuFT02I\&list=PLLKT__MCUeix3O0DPbmuaRuR_4Hxo4m3G\&index=8\&t=0s) (8:43)
8. [Buffer Overflows Made Easy - Part 8: Generating Shellcode and Gaining Shells](https://www.youtube.com/watch?v=qSjxR8tfokg\&list=PLLKT__MCUeix3O0DPbmuaRuR_4Hxo4m3G\&index=9\&t=0s) (7:12)
