Hey there. If Vorpidi shared this to you and you’re new. This is the curriculum of the H4k2l1v3 community. Something you’ll be very familiar with if you manage to join us (cult ahh sentence lmao). If you haven’t joined us already and plan to. make sure to complete from Day 1 to at the very least Day 12 and note it down in Notion or a similar note taking software such as obsidian and host it publicly (see setting up quartz with obsidian to make a publicly accessible vault on the internet to know how to host obsidian vaults like i did here) so you can submit it as proof when the selection process begins. the videos are just there to give you a basic overview of the various topics you’ll need to cover and in no way teaches you everything. make sure to do your own research on the topics

Stage 1 : Basics


Day 1 : Introduction to Ethical Hacking in Bangla | Beginner’s Guide

Outline : 

  1. Introduction

  2. Daily life of a penetration tester or an ethical hacker

  3. Effective Note Keeping

  4. Important Tools For Note Keeping

some resources added by Vorpidi to the curriculum:

Day 2 : Ethical Hacking in Bangla | IP and MAC Address Explained

Outline :

  1. Network Refresher Introduction

  2. Ip address

  3. Mac Address

Day 3 : OSI and TCP-IP Model | Ethical Hacking in Bangla Explained

Outline :

  1. OSI and the TCP/IP Model

  2. TCP, UDP & Three Way Handshake

  3.  Common Ports And Protocols (make sure to get a thorough understanding of what each protocol does and how they work at a low level)

  4. Subnetting (you’ll have to manually do subnetting calculations. prepare accordingly)

some resources added by Vorpidi to the curriculum:

Day 4 : Kali Linux for Beginners | Ethical Hacking Tutorial in Bangla

Outline :

  1. Installing Vmware or VirtualBox

  2. Installing Kali Linux

  3. Configuring virtualbox

  4. Kali linux overview

  5. Sudo overview

  6. Navigating File System

some resources added by Vorpidi to the curriculum:

Day 5 : User, Privileges & File System in Kali Linux | Ethical Hacking for Beginners in Bangla

Outline :

  1. Users And Privileges

  2. File system of linux system

  3. How to add different users

  4. Default root login

Day 6 : Kali Linux for Beginners | Ethical Hacking Tutorial in Bangla (Final Part)

Outline :

  1. Common Network Commands

  2. Viewing, Creating And Editing Files

  3. Started and stopping services

  4. Installing And Updating Tools

Day 7 : 5 Stages of Hacking | Ethical Hacking Explained in Bangla | Beginner’s Guide

Outline :

  1. 5 stages of ethical hacking

  2. Passive and active recon

  3. Identifying our target

  4. Breached Credentials

some resources added by Vorpidi to the curriculum:

Day 8 : Ethical Hacking in Bangla | SubDomain Enumeration explained for beginners

Outline :

  1. Hunting subdomains

  2. Identifying Web technologies

Day 9 : Ethical Hacking In Bangla | BurpSuite Basic For Beginners 

Outline :

  1. Gathering Information From Burpsuite

  2. Burpsuite different tabs overview

  3. Idea about proxy tab

  4. Idea about repeater tab 

  5. Idea about target tab

  6. Idea about intruder tab 

Day 10 : Ethical Hacking In Bangla | Osint | Google Dorking And Social Media Search Techniques  

Outline :

  1. Google fu

  2. Utilizing social media

some resources added by Vorpidi to the curriculum:

Day 11 : Ethical Hacking In Bangla | Installing Kioptrix | Hacking Lab For Beginners | Practical

Outline :

  1. Kioptrix Installation

Day 12 : Nmap Basics Bangla Tutorial | Learn the Fundamentals of Nmap | Ethical Hacking for Beginners

Outline : 

  1. Scanning with nmap
some resources added by Vorpidi to the curriculum:

Day 13 : Mastering HTTP Enumeration - Essential Guide for Ethical Hacking | Ethical Hacking In Bangla

Outline :

  1. Enumerating http/https

Day 14 : SMB and SSH Enumeration

Outline :

  1. Enumerating smb

  2. Enumerating ssh

some resources added by Vorpidi to the curriculum:

Day 15 : Vulnerability Analysis in Bangla – Uncover Security Threats | Ethical Hacking In Bangla

Outline : 

  1. Researching the potential vulnerabilities

  2. Our notes revised

some resources added by Vorpidi to the curriculum:

Day 16 : Nessus

Outline :

  1. Installing Nessus

  2. Scanning With Nessus

some resources added by Vorpidi to the curriculum:

Day 17 : Exploiting Kioptrix with Metasploit | Reverse Shell/Bind Shell | Ethical Hacking In Bangla

Outline :

  1. Reverse Shell vs Bind Shell

  2. Staged vs non-staged payloads

  3. Gaining root With metasploit

Day 18 : Final Part | Exploiting Kioptrix Manually | How to Perform Brute-Force Attack | Bangla

Outline :

  1. Manual exploitation

  2. Brute force attacks

  3. Credential stuffing and password sniffing 

  4. Our notes revised

Stage 2 : Exploitation


Day 19 : TCM Security Capstone Academy Walkthrough in Bangla

Download Link : PEH Capstone

Outline :

  1. Academy setup

  2. Academy exploitation technique

Day 20 : TCM Security Capstone Dev Walkthrough in Bangla

DownLoadLink : PEH Capstone

Outline :

  1. Dev Setup

  2. Dev exploitation

Day 21 : TCM Security Capstone BlackPearl Walkthrough in Bangla | pJPT, eJPT, Ceh Practical Bangla Guide

DownLoadLink: PEH Capstone

Outline :

  1. Blackpearl Setup

  2. Blackpearl exploitation

Stage 3 : Prep for CEH and eJPT


Day 22 : How to Create a TryHackMe Account & Get Started | Ethical Hacking for Beginners in Bangla

CreateAccount : https://tryhackme.com/signup 

Outline :

  1. Introduction to tryhackme

  2. Creating account

  3. Tryhackme deep overview

Day 23 : Bolt CMS Exploitation Tutorial (Bangla) | TryHackMe ‘Bolt: A Hero is Unleashed’ Walkthrough

Room Link : TryHackMe | Bolt 

Outline : 

  1. Bolt cms exploitation techniques

  2. Researching vulnerabilities

Day 24 : TryHackMe Blog Room Walkthrough in Bangla | WordPress Cms Hacking | CEH Practical & eJPT guide

Room Link : TryHackMe | Blog

Outline :

  1. Wordpress vulnerabilities

  2. Vulnerable plugin enumeration

  3. Wordpress hacking

Day 25 : ColddBox:Easy TryHackMe Walkthrough in Bangla | WordPress Cms Exploitation | CEH Practical & eJPT

Room Link : TryHackMe | ColddBox: Easy 

Outline :

  1. Wordpress cms exploitation

  2. Reverse shell

Day 26 : Fuel Cms | Ignite TryHackMe Walkthrough in Bangla | eJPT & CEH Practical Exam Preparation

Room Link : TryHackMe | Ignite 

Outline :

  1. Ignite Cms exploitation 

Day 27 : SQL INJECTION (make sure to learn how to manually do all the SQLi types from burp)

Room Link : TryHackMe | SQHell 

Outline :

  1. Sql injection introduction

  2. Sql injection overview

  3. Sql injection

some resources added by Vorpidi to the curriculum:

VideoLink :  Basic Pentesting TryHackMe Walkthrough in Bangla | eJPT & CEH Practical Preparation Outline :

  1. Penetration testing basic

  2. Think out of the box

Video Link : Kenobi TryHackMe Walkthrough in Bangla | Prepare for eJPT & CEH Practical

Day 30 : 

Room Link : Easy Peasy

Outline :

  1. Hash Cracking 

Day 31 : Agent Sudo TryHackMe Walkthrough in Bangla | eJPT & CEH Practical Preparation

Room Link : TryHackMe | Agent Sudo 

Day 32 : RootMe TryHackMe Walkthrough in Bangla | eJPT & CEH Practical Exam Preparation

Room Link : TryHackMe | RootMe 

Day 33 : Brooklyn Nine-Nine TryHackMe Walkthrough in Bangla | eJPT & CEH Practical Exam Preparation

Room Link : TryHackMe | Brooklyn Nine Nine  (BruteForce)

Day 34 : SkyNet TryHackMe Walkthrough in Bangla | eJPT & CEH Practical Exam Preparation  

Room Link : TryHackMe | Cyber Security Training 

Day 35 : StartUp TryHackMe Walkthrough in Bangla | eJPT & CEH Practical Prep

Room Link : TryHackMe | Startup 

Day 36 : Gaming Server TryHackMe Walkthrough in Bangla | eJPT & CEH Practical Exam Preparation

Room Link : TryHackMe | GamingServer 

Day 37 : Blue TryHackMe Walkthrough in Bangla | hacking windows 7 | EternalBlue | ms17-010

Room Link : TryHackMe | Blue 

some resources added by Vorpidi to the curriculum:

Day 38 : Hacking Windows 7 | ICE TryHackMe Walkthrough in Bangla | eJPT and CEH Practical Guide

Room Link : TryHackMe | Ice 

Day 39 : Blaster TryHackMe Walkthrough in Bangla | hacking windows | UAC Bypass | eJPT & CEH Practical Guide

Room Link : TryHackMe | Blaster 

some resources added by Vorpidi to the curriculum:

Day 40 : 

Room Link : https://tryhackme.com/r/room/steelmountain   

Day 41 : Relevant TryHackMe in Bangla | eJPT & CEH Practical Exam Preparation | windows Server 2016 Hacking

Room Link : TryHackMe | Relevant 

Day 42 : 

Room Link : ICA: 1 ~ VulnHub 

Day 43 : 

Room Link : DC: 1 ~ VulnHub 

Day 44 : 

Room Link : Hack Me Please: 1 ~ VulnHub 

Day 45 : 

Room Link : symfonos: 1 ~ VulnHub 

Day 46 : 

Room Link : TryHackMe | Linux PrivEsc (1-5)

Day 47 :

Room Link :  TryHackMe | Linux PrivEsc (6-10)

Day 48 : 

Room Link : TryHackMe | Linux PrivEsc (11-15)

Day 49 : 

Room Link : TryHackMe | Linux PrivEsc (16-21)

Day 50 : 

Room Link : TryHackMe | Linux Privilege Escalation (1-3)

Day 51 : 

Room Link : TryHackMe | Linux Privilege Escalation (4-6)

Day 52 : 

Room Link : TryHackMe | Linux Privilege Escalation (7-9)

Day 53 : 

Room Link : TryHackMe | Linux Privilege Escalation (10-12)

Day 54 : 

Room Link : Wreath (1-5)

Day 55 : 

Room Link : Wreath (6-10)

Day 56 : 

Room Link : Wreath (11-15)

Day 57 : 

Room Link : Wreath (16-20)

Day 58 : 

Room Link : Wreath (21-25)

Day 59 : 

Room Link : Wreath (26-30)

Day 60 : 

Room Link : Wreath (31-35)

Day 61 : 

Room Link : Wreath (36-40)

Day 62 : 

Room Link : Wreath (41-46)

Day 63 : 

Room Link : TryHackMe | VulnNet: Internal

Stage 4 : Active Directory


this part’s extra. isn’t really required for eJPT or CEH. but it is helpful for the OSCP, PNPT, CRTO, CPTS exams

Day 64 : 

Outline : 

  1.  Active Directory Overview

  2. Physical Active Directory Component

  3. Logical active Directory Component

Day 65 : 

Outline : 

  1. Ad Lab Overview

  2. Downloading Necessary ISO’s

  3. Setting Up Domain Controller

Day 66 : 

Outline : 

  1. Setting up user machines

  2. Setting up users, groups and policies

  3. Joining Our Machines to the domain

Day 67 : 

Outline : 

  1.  Initial Ad Attack Overview

  2. LLMNR poisoning Overview

  3. Capturing NTTLMv2 Hash from responder

  4. Password Cracking 

Day 68 : 

  1. Smb Relay Attack

  2. Quick Lab Update

  3. Discovering host with smb signing disable

  4. Smb relay attack

  5. Gaining Shell Access

Day 69 : 

  1. IPv6 Attacks Overview

  2. Installing mitm6

  3. Setting up ldaps

  4. IPv6 Dns Attacks

Day 70 : 

  1. Passback Attacks

  2. Other Attack Vector And strategies

Day 71 : 

  1. Post Compromise enumeration

  2. Powerview overview

  3. Domain Enumeration With Powerview

Day 72 : 

  1. Bloodhound Overview

  2. Grabbing Data with Invoke Bloodhound

  3. Using Bloodhound to review domain datta

Day 73 : 

  1. Pass the Hash And password overview

  2. Installing crackmapexec

  3. Pass the password attacks

  4. Dumping hashes with secretdump

  5. Cracking NTLM hashes with hashcat

  6. Pass the hash attacks

Day 74 : 

  1. Token Impersonation Overview

  2. TToken Impersonation With Incognito

Day 75 : 

  1. Kerberoasting Overview

  2. Kerberoasting Overview

Day 76 : 

  1. GPP Password Attacks Overview

  2. Abusing GPP

  3. Url File Attacks

Day 77 : 

  1. Mimikatz Overview

  2. Credential Dumping With Mimikatz

  3. Golden Tickets Attacks