Companies Home Search Profile

Ethical Hacking and Penetration Testing with Kali Linux

Focused View

EDUCBA Bridging the Gap

21:08:08

0 View
  • 1. Introduction Part 1.mp4
    05:34
  • 2. Introduction Part 2.mp4
    08:05
  • 3. Kali Linux.mp4
    11:47
  • 4. Operating Systems Part 1.mp4
    05:20
  • 5. Operating Systems Part 2.mp4
    09:21
  • 6. Installing Operating Systems.mp4
    08:58
  • 7. Installing vmware tools.mp4
    10:22
  • 8. Configuring Kali Linux.mp4
    09:21
  • 9. Installing Kali Linux on MacBook.mp4
    11:17
  • 10. What is Footprinting.mp4
    10:20
  • 11. Footprinting Objectives.mp4
    09:15
  • 12. Footprinting Tools.mp4
    12:16
  • 13. Google Hacking part 1.mp4
    08:50
  • 14. Google Hacking continued.mp4
    07:00
  • 15. Google Hacking further continued.mp4
    06:38
  • 16. WhOIS lookup.mp4
    10:14
  • 17. DNS footprinting Part 1.mp4
    06:46
  • 18. DNS footprinting Part 2.mp4
    07:03
  • 19. Determining Operation System.mp4
    09:41
  • 20. Phishing Attacks Part 1.mp4
    07:00
  • 21. Phishing Attacks Part 2.mp4
    07:01
  • 22. Connecting information database.mp4
    11:56
  • 23. Nmap and ZenMap.mp4
    10:16
  • 24. Nmap and ZenMap continued.mp4
    07:26
  • 1. The Harvester Part 1.mp4
    06:29
  • 2. The Harvester Part 2.mp4
    05:59
  • 3. WHOIS and dnsenum Part 1.mp4
    07:48
  • 4. WHOIS and dnsenum Part 2.mp4
    07:17
  • 5. Urlcrazy and dnsdict6 Part 1.mp4
    06:24
  • 6. Urlcrazy and dnsdict6 Part2.mp4
    05:45
  • 7. Dnsrecon.mp4
    09:19
  • 8. Dnsmapping.mp4
    11:04
  • 9. Introduction.mp4
    09:45
  • 10. Types of Social Engineering.mp4
    09:56
  • 11. Social Engineering attacks.mp4
    07:03
  • 12. Spear-phishing Attack.mp4
    11:02
  • 13. Phishing Attack Part 1.mp4
    07:00
  • 14. Phishing Attack Part 2.mp4
    07:01
  • 15. Mass mailer Attack.mp4
    09:16
  • 16. Types of Computer Malwares Part 1.mp4
    06:40
  • 17. Types of Computer Malwares Part 2.mp4
    07:52
  • 18. Dangerous viruses of all time Part 1.mp4
    07:32
  • 19. Dangerous viruses of all time Part 2.mp4
    07:53
  • 20. Installing Rootkit Hunter.mp4
    06:44
  • 21. command prompt backdoor Part 1.mp4
    07:06
  • 22. Command prompt backdoor Part 2.mp4
    06:29
  • 23. Backdoor & Gaining Access.mp4
    09:01
  • 24. Backdoor & Maitaining Access Part 1.mp4
    07:15
  • 25. Backdoor & Maitaining Access Part 2.mp4
    05:24
  • 1. Command prompt backdoor.mp4
    08:00
  • 2. Command prompt backdoor continued.mp4
    07:07
  • 3. Meterpreter Backdoor.mp4
    10:49
  • 4. I am Root.mp4
    13:50
  • 5. Forensic escaping.mp4
    06:53
  • 6. Hacking win7 SAM database.mp4
    10:46
  • 7. Jack the ripper.mp4
    11:32
  • 8. Meterpreter commands.mp4
    12:30
  • 9. PDF embedded Trojan Horse.mp4
    11:03
  • 10. Java Applet Attack Method Part 1.mp4
    06:37
  • 11. Java Applet Attack Method Part 2.mp4
    07:59
  • 12. MITM Attack.mp4
    09:26
  • 13. ARP Poisoning.mp4
    10:55
  • 14. DNS spoofing vs DNS poisoning.mp4
    08:19
  • 15. DNS spoofing.mp4
    09:59
  • 16. DNS spoofing continued.mp4
    10:38
  • 17. DHCP Spoofing.mp4
    12:25
  • 18. Port Stealing.mp4
    11:22
  • 19. ICMP redirection Part 1.mp4
    10:13
  • 20. ICMP redirection Part 2.mp4
    10:15
  • 21. ICMP redirection Part 3.mp4
    09:53
  • 22. Killing a Network.mp4
    10:46
  • 23. Ddosing unauthorised Network.mp4
    08:54
  • 24. Driftnet.mp4
    09:50
  • 25. EvilGrade.mp4
    09:23
  • 26. EvilGrade continued.mp4
    08:47
  • 27. Introduction to DoS.mp4
    09:32
  • 28. DoS vs DDoS.mp4
    06:30
  • 29. Levels of Ddos Attacks.mp4
    07:58
  • 30. Preventing DDoS Attacks.mp4
    09:05
  • 31. DDoSing Windows 7 method 1.mp4
    10:39
  • 32. DDoSing Windows 7 method 2.mp4
    09:48
  • 1. Hacking through Android Part 1.mp4
    06:00
  • 2. Hacking through Android Part 2.mp4
    06:51
  • 3. Hacking Android via Kali Linux.mp4
    11:30
  • 4. Introduction to Password Cracking.mp4
    11:29
  • 5. Password cracking Strategy.mp4
    11:47
  • 6. Password cracking Strategy Continued.mp4
    09:51
  • 7. Windows Password cracking Part 1.mp4
    07:52
  • 8. Windows Password cracking Part 2.mp4
    07:03
  • 9. Linux Hash Cracking.mp4
    08:52
  • 10. Linux Hash Cracking continued.mp4
    12:41
  • 11. Generating wordlist.mp4
    07:33
  • 12. Generating wordlist continued.mp4
    08:00
  • 13. CeWL cracking.mp4
    08:45
  • 14. WEP and WPA.mp4
    09:39
  • 15. WPA2.mp4
    10:34
  • 16. 1X standard.mp4
    08:40
  • 17. Wireless cracking via Kali.mp4
    08:52
  • 18. Wireless cracking via Kali continued.mp4
    08:58
  • 19. Activating payloads.mp4
    14:15
  • 20. Activating payloads continued.mp4
    09:06
  • 1. Msfconsole Explained.mp4
    12:01
  • 2. Msfconsole Commands.mp4
    11:54
  • 3. Exploits.mp4
    11:37
  • 4. Payloads.mp4
    09:51
  • 5. Generating Payloads.mp4
    10:49
  • 6. Generating Payloads Continued.mp4
    11:37
  • 7. Intro to Sql Injection.mp4
    07:46
  • 8. Sql Injection to Google Dorks.mp4
    11:22
  • 9. Sql Mapping Via Kali Linux.mp4
    09:56
  • 10. Gathering Password And Cracking The Hash.mp4
    09:12
  • 11. Introduction Part 1.mp4
    05:34
  • 12. Introduction Part 2.mp4
    08:05
  • 13. Hash Func and Oracle Method.mp4
    09:36
  • 14. Birthday Theorem And Digital Signature.mp4
    09:36
  • 15. Pros And Cons of Cryptography.mp4
    08:12
  • 16. Importing Databases.mp4
    09:05
  • 17. Exporting Databases Part 1.mp4
    07:17
  • 18. Exporting Databases Part 2.mp4
    05:41
  • 1. Introduction to Pentesting.mp4
    09:22
  • 2. Creating a Virtual Pentesting Lab.mp4
    08:22
  • 3. Nmap Scanning.mp4
    11:07
  • 4. Advanced Scanning.mp4
    10:21
  • 5. Nmap Zombie Scan.mp4
    10:45
  • 6. Nmap Timing Options.mp4
    07:35
  • 7. Nmap Pre-Existing Scripts.mp4
    07:46
  • 8. Simple Nmap Scripts.mp4
    07:15
  • 9. Simple Nmap Scripts Continues.mp4
    05:09
  • 10. Python Port Scanner.mp4
    07:27
  • 11. More on Post Scanner.mp4
    08:19
  • 12. SMTP Mail Server.mp4
    09:16
  • 13. Samba Exploit.mp4
    11:52
  • 14. NFS Exploit.mp4
    11:04
  • 15. Grey Box and White Box.mp4
    07:17
  • 16. The Malware.mp4
    12:17
  • 17. Social Engineering.mp4
    11:04
  • 18. Android Exploitation.mp4
    05:48
  • 19. Android Exploitation Continues.mp4
    07:16
  • 20. Hashdump and Password Phishing.mp4
    06:25
  • 21. Hashdump and Password Phishing Continues.mp4
    08:02
  • 22. Automated Handler with Resource.mp4
    10:16
  • Description


    Master the art of ethical hacking and safeguard networks with our comprehensive Kali Linux course

    What You'll Learn?


    • Introduction to Ethical Hacking and Kali Linux: Fundamental concepts of ethical hacking and penetration testing. Installation and configuration of Kali Linux.
    • Footprinting and Reconnaissance: Techniques for gathering information about targets. Tools for footprinting, including Google hacking, WHOIS lookup, and DNS
    • Scanning Networks: Using Nmap and ZenMap for network scanning. Understanding and executing various types of scans to identify open ports and services.
    • Social Engineering and Trojans: Different types of social engineering attacks. Identifying and mitigating threats from trojans and other malware.
    • Exploitation Techniques: Techniques for gaining and maintaining access to systems. Using backdoors and rootkits for exploitation.
    • Advanced Attacks: Conducting advanced attacks such as MITM (Man-In-The-Middle), DNS spoofing, and ICMP redirection. Techniques for DDoS.
    • Hacking Wireless Networks: Methods for cracking wireless network security (WEP, WPA, WPA2). Using Kali Linux tools for wireless network penetration testing.
    • Password Cracking: Strategies for cracking passwords on various operating systems. Generating and utilizing wordlists for brute force attacks.
    • Metasploit Framework: Understanding and using the Metasploit framework for exploitation. Generating and deploying payloads.
    • SQL Injection and Web Application Hacking: Techniques for exploiting SQL injection vulnerabilities. Using tools for SQL mapping and password cracking.
    • Cryptography: Fundamentals of cryptography and its applications in ethical hacking. Understanding hash functions, digital signatures, cryptographic methods.
    • Advanced Penetration Testing: Creating a virtual pentesting lab. Advanced network scanning techniques and exploiting various vulnerabilities.

    Who is this for?


  • Aspiring Cybersecurity Professionals: Individuals who want to start a career in cybersecurity and ethical hacking.
  • IT Professionals: IT administrators, network administrators, and system administrators who want to enhance their security skills.
  • Students and Graduates: College and university students in computer science, information technology, and related fields who want to gain practical knowledge in ethical hacking.
  • Security Enthusiasts: Individuals with a passion for cybersecurity who want to learn how to protect systems from potential threats.
  • Developers: Software and web developers who want to understand the security aspects of their applications and how to protect them.
  • Business Owners: Small business owners and entrepreneurs who want to ensure the security of their business infrastructure.
  • Anyone Interested in Ethical Hacking: Beginners with no prior experience in hacking who want to learn the fundamentals and advance to more complex topics.
  • What You Need to Know?


  • Basic Computer Skills: Familiarity with operating systems (Windows, macOS, Linux). Basic understanding of computer networks and internet concepts.
  • Interest in Cybersecurity: A keen interest in learning about cybersecurity, ethical hacking, and penetration testing.
  • Hardware and Software: A computer with at least 4GB of RAM and sufficient storage. Ability to install and run virtual machines (e.g., VMware or VirtualBox).
  • More details


    Description

    Course Introduction

    Ethical hacking and penetration testing are critical skills in the cybersecurity domain, enabling professionals to identify and mitigate potential threats before they can be exploited by malicious actors. This comprehensive course, "Ethical Hacking and Penetration Testing with Kali Linux," is designed for beginners and advanced users alike, providing an in-depth exploration of ethical hacking techniques and tools using the powerful Kali Linux operating system. Whether you are a cybersecurity enthusiast or an IT professional looking to enhance your skills, this course will equip you with the knowledge and practical experience needed to excel in the field of ethical hacking.

    Section 1: Ethical Hacking and Penetration Testing Kali Linux - Beginners

    This section serves as the foundation for understanding ethical hacking, starting with an introduction to the key concepts and the importance of ethical hacking. You will then dive into Kali Linux, the preferred operating system for penetration testing, and learn about its installation and configuration. The lectures will cover essential topics such as footprinting, Google hacking, and DNS footprinting, providing you with the basic skills needed to begin your journey in ethical hacking.

    Section 2: Ethical Hacking & Penetration Testing Kali Linux - Social Engineering and Trojans

    Building on the foundational knowledge, this section focuses on social engineering and the use of trojans. You will learn about various social engineering attacks, including spear-phishing and mass mailer attacks, as well as the different types of computer malware. The lectures will also cover the installation and use of tools like Rootkit Hunter and methods for maintaining access through backdoors. This section emphasizes the human element in cybersecurity and the importance of understanding and defending against social engineering attacks.

    Section 3: Ethical Hacking and Penetration Testing Kali Linux - Meterpreter, DNS and ICMP

    In this section, you will explore advanced penetration testing techniques using Meterpreter, DNS, and ICMP. You will learn how to exploit systems using Meterpreter commands, perform DNS spoofing and poisoning, and conduct ICMP redirection attacks. The lectures will also cover denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks, including methods for preventing these attacks. This section provides a deeper understanding of network-based attacks and how to effectively defend against them.

    Section 4: Ethical Hacking and Penetration Testing Kali Linux - Hacking

    This section delves into hacking techniques, focusing on password cracking and wireless network attacks. You will learn about various password cracking strategies, including Windows and Linux hash cracking, and generating wordlists. The lectures will also cover wireless network attacks, such as WEP, WPA, and WPA2 cracking, and the use of payloads to exploit vulnerabilities. This section equips you with practical skills to perform and defend against hacking attacks.

    Section 5: Ethical Hacking and Penetration Testing Kali Linux

    Continuing with advanced topics, this section covers the use of the Metasploit framework for ethical hacking. You will learn about msfconsole commands, generating payloads, and performing SQL injection attacks. The lectures will also introduce you to cryptography concepts, including hash functions and digital signatures, and database operations such as importing and exporting data. This section enhances your technical skills in using Metasploit and understanding cryptographic principles.

    Section 6: Advanced Penetration Testing

    The final section focuses on advanced penetration testing techniques, including creating a virtual pentesting lab, advanced scanning with Nmap, and exploiting vulnerabilities in various services. You will also learn about social engineering attacks, Android exploitation, and automated handlers with resource scripts. This section prepares you for real-world penetration testing scenarios, providing hands-on experience with advanced tools and techniques.

    Course Conclusion

    By the end of this course, you will have a thorough understanding of ethical hacking and penetration testing using Kali Linux. You will be equipped with the skills to identify and exploit vulnerabilities, conduct advanced network attacks, and implement effective defense strategies. This comprehensive training will empower you to protect systems and networks from potential threats, making you a valuable asset in the cybersecurity field. Whether you are pursuing a career in ethical hacking or looking to enhance your existing skills, this course provides the knowledge and practical experience needed to succeed.

    Who this course is for:

    • Aspiring Cybersecurity Professionals: Individuals who want to start a career in cybersecurity and ethical hacking.
    • IT Professionals: IT administrators, network administrators, and system administrators who want to enhance their security skills.
    • Students and Graduates: College and university students in computer science, information technology, and related fields who want to gain practical knowledge in ethical hacking.
    • Security Enthusiasts: Individuals with a passion for cybersecurity who want to learn how to protect systems from potential threats.
    • Developers: Software and web developers who want to understand the security aspects of their applications and how to protect them.
    • Business Owners: Small business owners and entrepreneurs who want to ensure the security of their business infrastructure.
    • Anyone Interested in Ethical Hacking: Beginners with no prior experience in hacking who want to learn the fundamentals and advance to more complex topics.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    EDUCBA Bridging the Gap
    EDUCBA Bridging the Gap
    Instructor's Courses
    EDUCBA is a leading global provider of skill based education addressing the needs of 1,000,000+ members across 70+ Countries. Our unique step-by-step, online learning model along with amazing 5000+ courses and 500+ Learning Paths prepared by top-notch professionals from the Industry help participants achieve their goals successfully. All our training programs are Job oriented skill based programs demanded by the Industry. At EDUCBA, it is a matter of pride for us to make job oriented hands-on courses available to anyone, any time and anywhere. Therefore we ensure that you can enroll 24 hours a day, seven days a week, 365 days a year. Learn at a time and place, and pace that is of your choice. Plan your study to suit your convenience and schedule.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 141
    • duration 21:08:08
    • Release Date 2024/11/17