Companies Home Search Profile

Ethical Hacking: Security Testing with Raspberry Pi

Focused View

Daniel Dieterle

1:25:03

8 View
  • 1. Introduction Weaponizing your Raspberry Pi.mp4
    01:59
  • 1. Installing Kali Linux.mp4
    04:28
  • 1. Using NMAP to Perform Basic Network Scans.mp4
    06:04
  • 2. Network Recon with Reconnoitre.mp4
    02:58
  • 1. Scanning Web Apps for Vulnerabilities with Wapiti3.mp4
    04:08
  • 2. Testing Web App Security with Sniper.mp4
    03:16
  • 1. WiFi Scans Getting the Lay of the Land with Airodump-NG.mp4
    05:39
  • 2. WiFi Security Tests Using BetterCap.mp4
    09:06
  • 3. WiFi Attacks Cracking WPA Network Keys with Fern WiFi Cracker.mp4
    04:56
  • 4. Attacking Air Gapped Networks with P4wnP1 ALOA.mp4
    08:25
  • 1. C2 Command and Control with StarKiller Empire.mp4
    07:24
  • 2. C2 Using PoshC2 for Command & Control.mp4
    08:03
  • 1. PiOS, Pentesters FrameWork, SDR with Dragon OS, Ubuntu on the Pi.mp4
    08:52
  • 2. Future Uses of Raspberry Pi in Security.mp4
    09:45
  • Description


    Weaponizing Your Raspberry Pi - Red Team, Pentesting and Ethical Hacking with Kali Linux and Raspberry Pi!

    What You'll Learn?


    • Use Raspberry Pis for Pentesting, Red Team and Ethical Hacking
    • Perform Network Security Scans using Raspberry Pi and Kali Linux
    • Learn how to Perform Wi-Fi Scans and Attacks
    • See How to Build Your Own Pentesting Platforms on Raspberry Pi

    Who is this for?


  • This course is for both those new to Pentesting and Ethical Hacking and experienced Pentesters and Red Team members who want to expand their toolkit with Raspberry Pi
  • What You Need to Know?


  • This is a Step-by-Step learning series, but it would be best to have basic Linux usage and networking experience, also familiarity with a raspberry Pi is highly recommended but not necessary.
  • More details


    Description

    Welcome to "Security Testing with Raspberry Pi," an innovative course meticulously crafted for the modern cybersecurity professional. In this dynamic program, we'll not only explore the basics of ethical hacking using Kali Linux and Raspberry Pi but also delve into advanced techniques, including Software Defined Radio (SDR), and the creation of custom platforms.

    Portability and Accessibility

    One of the key advantages of Kali Linux on a Raspberry Pi is portability. The Raspberry Pi's small form factor makes it an ideal platform for on-the-go ethical hacking. Whether you're conducting security assessments in diverse environments or performing Red Team building penetration tests, the Raspberry Pi allows you to carry your hacking toolkit in your pocket.

    Course Overview: Embark on a comprehensive journey as we unlock the potential of Kali Linux, strategically implement offensive security practices, and exploit vulnerabilities responsibly. Beyond the basics, this course pushes the boundaries by integrating cutting-edge technologies, ensuring you're well-equipped to face the challenges of contemporary cybersecurity.

    Key Highlights:


    • Kali Linux: Uncover using Kali Linux on a Raspberry Pi, exploring its powerful penetration testing tools and mastering the art of ethical hacking.

    • Offensive Security Techniques: Proactively identify, exploit, and secure systems, gaining hands-on experience in offensive security tools.

    • Penetration Testing Essentials: Develop expertise in Reconnaissance, Scanning, Exploitation, and Wireless Security, essential for effective penetration testing.

    • Raspberry Pi Integration: Harness the compact yet powerful Raspberry Pi as a platform for ethical hacking, creating your portable toolkit for on-the-go security assessments.

    • Software Defined Radio (SDR): Explore the realm of using SDR on a Pi using DragonOS.

    • Pentest Drop Boxes: Kali on a Pi is the perfect solution for deploying and utilizing pentest drop boxes, enabling remote testing and assessment of target environments.

    • Building Custom Platforms: Elevate your skills by building custom platforms tailored to specific ethical hacking needs, ensuring adaptability to diverse scenarios.

    Who Should Enroll: This course caters to computer science professionals, IT administrators, and cybersecurity enthusiasts seeking to advance their skills in ethical hacking. Whether you're an experienced practitioner or a beginner, this class offers a hands-on learning experience that goes beyond conventional boundaries.

    Join us on this thrilling journey of ethical hacking with Kali Linux, Raspberry Pi, SDR, and the tools of tomorrow. Let's fortify the digital landscape together!


    Disclaimer:  This is an Ethical Hacking course. Always practice training in a test lab environment. Never use the techniques shown here to test, access or attack a system that you do not have permission to access. Doing so is illegal, and you could go to jail. This course is for informational purposes only.


    Who this course is for:

    • This course is for both those new to Pentesting and Ethical Hacking and experienced Pentesters and Red Team members who want to expand their toolkit with Raspberry Pi

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Daniel Dieterle
    Daniel Dieterle
    Instructor's Courses
    Daniel W. Dieterle has worked in the IT field for over 20 years. During this time, he worked for a computer support company where he provided system and network support for hundreds of companies across Upstate New York and throughout Northern Pennsylvania. He also worked in a Fortune 500 Corporate Data Center, an Ivy League School’s Computer Support Department and served as an Executive at an Electrical Engineering company and on the Board of Directors for a Non-Profit corporation.For over the last 10 years Daniel has been completely focused on security as a Computer Security Researcher and Author. His articles have been published in International Security Magazines and referenced by both technical entities and the media. He has published 9 book on using Kali Linux in Offensive Security.  His Kali Linux based books are used worldwide as a teaching & training resource for universities, technical training centers, government, military and private sector organizations. Daniel has assisted Publishing Companies with creating and reviewing numerous security training classes, technical books and articles. He also enjoys helping out those new to the field.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 14
    • duration 1:25:03
    • Release Date 2024/03/03