تفاصيل الدورة

Discover the methods used by famous hackers on Kali Linux to execute different commands for hacking your target while keeping your information secure and private.

You will start this course off by implementing tips for securing and protecting Kali Linux via VPN services, and for setting custom proxy configurations. Then, you will set up a password dictionary, learn to lock onto your target, and perform reconnaissance. Next you will focus on discovering new methods to speed up your Kali Linux machine from hardware upgrades to software configurations. Moving on, you will patch up any security flaws you may have lurking on your Kali machine. And finally you will carry out a full-scale attack from recon work to cracking passwords and gaining access to your target.

By the end of this course, you will have enhanced your hacking abilities with new methods and techniques you can utilize to perform proper ethical hacking.

About the Author

Paul Olushile is a Unix/Linux System Administrator expert with 4 years' experience as a Kali Linux Penetration Tester. He's responsible for setting up and maintaining Linux servers, training and maintaining servers installed and set up with custom builds and applications on a network; for creating, deleting, and modifying local user and group accounts; and troubleshooting and fixing NFS, TCP/IP, and other protocol problems. He's a freelancer in Kali Linux Penetration Testing and Research, breaking into computers and networks in order to find potential security breaches, running tests, creating written reports, detailing assessment findings and recommendations, designing new tests, designing and creating new penetration tools and tests, working on improvements to security services (including the continuous enhancement of existing methodology materials), supporting assets, and running security audits.

Aubrey Love II has been designing and developing websites for over 10+ years. He started off with a Commodore Vic20, on which he designed his first Hello World app at the age of 7. After attending several colleges and universities, he moved on and started his own website firm, in which he caters to all types of company, from startup ventures to Fortune 500 organizations.

تحديث بتاريخ 14 November, 2018
دورات يمكنك الالتحاق بها على الفور... خذ دورة عبر الإنترنت على Linux ابتداءً من الآن. See all courses

قيِم هذه الصفحة