Learning Kali Linux

Learning Kali Linux

Learn the secrets of ethical hacking, penetration testing, and network discovery using Kali Linux

Bestseller
15.87 9.52

About This Course

Kali Linux offers a large number of penetration testing tools from various different niches in the security and forensics fields. Kali Linux offers a multitude of options to scan a single IP, port, or host (or a range of IPs, ports, and hosts) to uncover vulnerabilities and security holes. The output and information can serve as a precursor to penetration testing efforts.
The course starts with vulnerability assessment and penetration testing. Then, you will learn about the process of ethical hacking from the initial identification and investigation to the final exploitations and report. Next, we will build a test lab in a virtual environment using Oracle VirtualBox, Kali Linux, and a vulnerable OS. You will get started with reconnaissance to gather information about a target. Next, you will focus on NMAP, which is one of the biggest and most popular networks and host scanning tools. You will also learn to avoid being detected by firewalls and IPs when using NMAP. Vulnerability assessment and analysis are the most important steps before trying to hack and penetrate a system so we will learn to initiate an exploit and penetrate a system. Finally, you'll exploit a system and, once exploitation is confirmed, you'll prepare and present a report to the customer.

By the end of the course, you will be an excellent hacker and will have mastered all the hows and whys of ethical hacking.

The code bundle for this course is available at https://github.com/PacktPublishing/Learning-Kali-Linux

Other Information

  • Certificate will provided in this course on Completion
  • Full lifetime access
  • Available on Mobile & Laptop

What Students Will Learn In Your Course?

  • How to test your network against various types of attack and develop a network-testing environment that can be used to test scanning tools and techniques
  • Vulnerability scanning and validating using pen testing tools
  • Enumeration and fingerprinting in the ethical hacking process
  • Build a test lab in a virtual environment with Kali Linux
  • Start gathering information about a target with passive and active reconnaissance
  • Learn about NMAP, the biggest and most popular network and host-scanning toolset

Are There Any Course Requirements Or Prerequisites?

Basics of Linux is assumed.

Who Are Your Target Students?

 

This course is for developers who have an interest and want to learn Kali Linux. Ethical hackers, penetration testers, system administrators, and IT security professionals who wish to master network security by learning Kali Linux will benefit greatly from this course.

Course Content

  • 39 lectures
  • 03:20:24
  • The Course Overview
    00:03:29
  • Penetration Testing
    00:02:59
  • White Box Versus Black Box Versus Gray Box
    00:04:05
  • Vulnerability Assessment Versus Penetration Testing
    00:05:05
  • Ethical Hacker Responsibilities and Customer Expectations
    00:04:13
  • Laws and Legal Obligations
    00:04:35
  • Preparation Steps for Penetration Testing
    00:04:15
  • First Step of Penetration Testing ‚AI Reconnaissance
    00:04:00
  • Scanning, Enumeration, and Fingerprinting
    00:03:32
  • Vulnerability Assessment
    00:05:21
  • Exploitation and Access
    00:05:00
  • Reporting
    00:03:56
  • Test Lab Requirements
    00:04:48
  • Diagram and Design
    00:03:46
  • Test Connectivity
    00:09:30
  • Passive Reconnaissance ‚AI Part 1
    00:07:03
  • Passive Reconnaissance ‚AI Part 2
    00:05:22
  • Active Reconnaissance
    00:06:31
  • Dmitry
    00:04:09
  • Maltego
    00:08:56
  • TCP, UDP and, ICMP Scanning
    00:04:36
  • Nmap ‚AI ICMP Scan
    00:04:40
  • Nmap ‚AI TCP Scan
    00:05:12
  • Nmap ‚AI Advanced TCP Scans
    00:04:46
  • Nmap ‚AI UDP Scan
    00:05:20
  • OS Detection
    00:05:49
  • Avoid Detection
    00:06:47
  • Nmap ‚AI Scripts and Script Engine
    00:05:38
  • Nmap Troubleshooting
    00:06:50
  • hping3
    00:09:26
  • Nikto
    00:05:42
  • Sparta
    00:03:37
  • Ettercap
    00:04:44
  • Metasploit
    00:05:11
  • Armitage
    00:05:31
  • Spear Phishing Attacks
    00:05:42
  • Credential Harvesting with Website Cloning
    00:03:27
  • Netcat
    00:03:08
  • John the Ripper
    00:03:43
Image

Packt Publication

  • 4.48 (5)
  • 13 Reviews
  • 5 Students
  • 935 Courses