Mastering Kali Linux Network Scanning

Mastering Kali Linux Network Scanning

Network Scanning done just right!

Bestseller
Created By: Brian Johnson
15.87 9.52

About This Course

With the rise in data flow, information security has become vital to every application. Kali Linux plays a very important role when it comes to securing your data or discovering loop holes within your system. With the huge set of tools present in Kali Linux 2017.1, this video will give you hands-on knowledge so you can perform Network Scanning tasks. This course will firstly walk you through the fundamentals of utilizing Kali Linux so you can gain control over your network environment. Then, this video will cover core network scanning tasks such as discovery scanning, port scanning, service enumeration, operating system identification, vulnerability mapping, and validating identified findings. Next, this tutorial will also teach you about network traffic capture and analysis along with leveraging OpenVAS 9 for vulnerability scanning. Lastly, this course will also teach you to create your own packages and host your own custom repositories along with securing and monitoring Kali Linux at the Network and filesystem level. By the end of this video, you will be very proficient at finding loop holes and conquering your network environment.

Other Information

  • Certificate will provided in this course on Completion
  • Full lifetime access
  • Available on Mobile & Laptop

What Students Will Learn In Your Course?

  • Learn the best ways to perform effective network scanning
  • Troubleshoot your network security with the best scanning methods
  • Get your network scanning machine ready to tackle security issues
  • Perform effective scanning with Nmap
  • Configure and tune Nmap for network scanning best practices
  • Select the most effective tools from Kali Linux to test network security
  • Use the NSE engine for better network scans
  • Combine Nmap and Searchsploit to find exploits in your network
  • Using OpenVAS for effective vulnerability scanning
  • Advanced OpenVAS practices for securing your network on systems
  • Manually scan your web applications for any vulnerabilities

Are There Any Course Requirements Or Prerequisites?

Some prior knowledge of Linux is necessary.

Who Are Your Target Students?

If you are a security professional or a pentester interested in securing and gaining control of your network environment, then this video is for you. Intermediate students who are looking at maximizing their usage of Kali Linux advanced features will also find this course useful.

Course Content

  • 22 lectures
  • 02:59:57
  • The Course Overview
    00:05:00
  • Preparing Your Network Scanning Maching
    00:09:17
  • Validating Network Connectivity
    00:05:37
  • Updating Kali Software Packages
    00:07:04
  • Adding a Non-Root User to Kali
    00:04:25
  • Creating a System Inventory Using Nmap
    00:06:44
  • Identifying Open Ports and Services on Systems
    00:04:42
  • Finding and Remediating System Vulnerabilities
    00:04:29
  • Monitoring Nmap Scans Using Verbose Logging
    00:05:53
  • Acquiring Permission to Conduct Network Scanning
    00:05:38
  • Finding Live Hosts on the Network
    00:07:35
  • Specifying Port Ranges to Make Scans More Efficient
    00:05:05
  • Nmap Output Formats
    00:07:59
  • Using Nmap Scripts for Automating Network Scanning
    00:11:39
  • Sparta and Eyewitness
    00:12:44
  • Installing and Running OpenVAS in Kali
    00:07:19
  • Basic Scanning with OpenVAS
    00:06:42
  • Advanced Scanning with OpenVAS
    00:07:43
  • Enumerating Websites
    00:08:17
  • Using Nikto to Find Web-Based Vulnerabilities
    00:12:06
  • Discovering Hidden Files and Folders
    00:15:38
  • Finding Website Vulnerabilities with Burp
    00:18:21
Image

Packt Publication

  • 4.48 (0)
  • 13 Reviews
  • 0 Students
  • 935 Courses