Companies Home Search Profile

CCNA Cyber Ops Tools: Kali Linux, Nmap, and Metasploit

Focused View

Bassam Alkaff • Remote Author @ INE

47:49

48 View
  • 1. Course Introduction & Overview.mp4
    04:57
  • 1. Introduction to Kali Linux.mp4
    03:10
  • 2. Downloading & Installing Kali Linux.mp4
    05:50
  • 3. Exploring Kali Linux.mp4
    03:42
  • 4. Working with the Metasploitable VM.mp4
    05:26
  • 1. Introduction to Nmap.mp4
    06:05
  • 2. Working with Nmap and Zenmap.mp4
    07:40
  • 1. Introduction to the Metasploit Framework.mp4
    03:16
  • 2. Working with the Metasploit Framework and Armitage.mp4
    07:43
  • Description


    Learn how to start using Kali Linux, Nmap, and Metasploit for ethical hacking, penetration testing, and red teaming

    What You'll Learn?


    • Introduction to Kali Linux
    • Downloading & Installing Kali Linux
    • Exploring Kali Linux
    • Working with the Metasploitable VM
    • Introduction to Nmap
    • Working with Nmap and Zenmap
    • Introduction to the Metasploit Framework
    • Working with the Metasploit Framework and Armitage

    Who is this for?


  • CCNA Cyber ops and computer networking students who want to learn about hot to use Kali Linux, Nmap, and Metasploit
  • What You Need to Know?


  • Basic Knowledge of TCP/IP.
  • Network+ or CCENT/ICND1 level knowledge is recommended, but not required.
  • More details


    Description

    It is estimated that there will be about 1.5 million unfilled jobs in cyber security by the year 2020. A more recent statistic increased this number for cyber security unfilled jobs to be 3.5 million by the year 2021. In addition, recent article highlights Cisco Systems intention to become a cyber security force. For these reasons, Cisco created the CCNA Cyber Ops certification, which can become one of the most certifications in demand in the near future. Furthermore, Cisco created a scholarship program for this certification, which emphasis its importance. 

    In this course you will learn about the tools that you can use for your study of the CCNA Cyber Ops certification and the current Cisco CyberOps Associate certification. Learning the theory side is important, but the hands on side is more important, since the main purpose of your study is to apply your knowledge in production, and since your hands on will enforce your theory knowledge. You can not teach someone how to drive a car by showing him or her how to do it, but you have to let him try and practice how to do that. Furthermore, showing you hands on labs and how to use tools without teaching you how to create these labs and install these tools, might not give you the ultimate benefit from your study . For this reason, I have created this course to teach you how to create your own home labs, and to understand the core usage and important features of the tools used in them. I believe in the saying: "Give a man a fish and you feed him for a day; teach a man to fish and you feed him for a lifetime". If you have access to online labs, such as that offered by Cisco through their scholarship, you still need to know how to create your own home labs to continue practicing and experimenting, which is what this course will help you to achieve. On the other hand, this course will prepare you to go through these online labs quickly, and with confidence, since you will be familiar with the tools used in them.  And not just online labs, but any other hands on Cyber Ops courses, like what I intend to publish in the near future.

    Kali Linux is an advanced penetration testing Linux distribution used for penetration testing, ethical hacking and network security assessments. And penetration testing is the practice of safely testing a computer system, network or application to find vulnerabilities that an attacker could exploit. And Black hat hackers use the same tools in Kali Linux, but we as the  pen-testers or white hat hackers will use them safely and with authorization from the organization we conduct testing for. So knowing how to use these tools included in Kali Linux will be very useful for us as security analysts.

    This course include the following lectures:

    1. Introduction to Kali Linux

    2. Downloading & Installing Kali Linux

    3. Exploring Kali Linux

    4. Working with the Metasploitable VM

    5. Introduction to Nmap

    6. Working with Nmap and Zenmap

    7. Introduction to the Metasploit Framework

    8. Working with the Metasploit Framework and Armitage


    I hope that you will join me in this course and start your Cyber security journey. Happy learning!

    Who this course is for:

    • CCNA Cyber ops and computer networking students who want to learn about hot to use Kali Linux, Nmap, and Metasploit

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Bassam Alkaff • Remote Author @ INE
    Bassam Alkaff • Remote Author @ INE
    Instructor's Courses
    Hello, My name is Bassam Faisal Alkaff and I have worked in the field of IT for more than 15 years. I specialize in networking and information security and hold several certifications such as CCDP, CCNPx3 (R&S, Sec, SP), VCPx2 (DC & NV), ITILv3.I have trained in IT training centers like APTECH, New Horizons, and ExecuTrain. Currently I work as Remote Author @ INE (Authored the following courses: CCNA Cyber Ops Labs - Create Your Labs and MTA : Networking Fundamentals (Exam 98-366) ) & publish Cisco courses on Udemy platform.I was the Top IEOC Contributor in July 2012 ( Internetwork Expert Online Community from INE).Beside technology, I like reading, creative writing, learning new languages, playing chess, and watching soccer games.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 9
    • duration 47:49
    • Release Date 2023/12/13