تفاصيل الدورة
Welcome to our Kali Linux tools for Penetration testing: Beginner to Pro
Kali Linux is a flavor of Linux targeted at digital forensics experts and penetration (pen) testers.It includes over 400 pen-testing programs, and it is the primary tool used by ethical hackers.Using Kali Linux, certified ethical hackers can test networks on their organizations' behalves, to see if they're vulnerable to outside attacks.
This course will give prospective ethical hackers a short overview of the tools in Kali Linux.In this course we will be shows how to set up a virtual environment for testing, configure Kali Linux, and install tool-sets for information gathering, vulnerability assessment, password and hash cracking, and target exploitation.
Because businesses are connected, they are also exposed. Vulnerability testing helps organizations limit that exposure.
This course will help you explore the careers, techniques, and tools behind ethical hackingone of the most competitive and sought-after IT security skills.
In this course you will not only learn the theory behind Kali Linuxbut you will also learn the practical side of Kali LinuxPenetration Testing tools.
This course also has PDFs for each of the lectures to help you follow along.
The following topics are covered in this course:
Introducing Kali
What is Kali Linux
Explore the quick access list
Change screen saver and font settings
Explore the application in kali
Update kali
Setting Up the Virtual Lab
Introduction to virtualization
Setting up a virtual box
Installing appliances
Working with advanced configuration in Virtual Box
Information Gathering Understanding the Target
Introducing Dmitri
Introducing DNSenum
Introducing Maltego
Reviewing the tools
Vulnerability Analysis
Introducing Maltego
Introducing Spike
Install OpenVAS
Run an OpenVAS scan
Custom scan with OpenVAS
Explore the OpenVAS menu
Install Vega
Web crawling with Vega
Review Vegas menus
Use Vega as a web proxy
Passwords and Hashes
Password testing
Use Command line tools
Windows Credential Editor
Use John the Ripper in Linux
Use John for windows password
Explore Johnny's options
Pass the hash
Use rainbow tables
Exploiting Targets
Overview of exploitation tools
Exploit Linux with Metasploit
Exploit Windows with Armitage
More exploiting with Armitage
Pivot through a network
Install persistent access
NOTE - 90% PRACTICAL DEMONSTRATION AND 10% OFTHEORY.
Notice - This course content is updated every month!
Take this course today and start yourjourney now!
EliteHakcer Team
- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at Laimoonدرهم 1,449مدة الدورة التدريبية: Upto 30 Hours
- Website Hacking From Scratch StudyHub13 USD
260 USDمدة الدورة التدريبية: Upto 10 Hours - Certified Penetration Testing Engineer Alpha Academy25 USD
280 USDمدة الدورة التدريبية: Upto 7 Hours