تفاصيل الدورة

Thank you to the 41,387 students enrolled in this course! Shouldn't you find out why?

Course Updated 24 November 2016

What's New?

2 Hours on an Introduction to Perl and How To Use Perl for Writing Ethical Hacking Scripts.

You will also learn How To Create Malware and Use Python to Create Hacking Scripts and an Nmap scanner. Also you will learn Brute Force Cracking Passwords with Python

Added:

Nessus Port Scanner and Vulnerability Scanner

Footprinting and Enumeration module

Here are a few 5 star reviews:

"Finally a clear course on Kali!

OMG thank you so much, I finally have a working kali linux installation on my computer!

This course is simply amazingly clear! I`ve never used any other os apart from Windows and Kali always was a mistery to me let alone installing it on my virtual machine. BUT this course solved it, I just followed the instructions and less than 10 minutes later kali is installed and working! The whole course is presented super clear, great video quality and no steps missed!

Cannot recommend it enough!" - TWO 2

"Great Course

firstly i want to thank the lecturer for the great course. and i want to say that the course definitely worth the time." - Berzan Hasan

"Very Informative

Fantastic course, lots of content and covers almost everything i need to know as a beginner .Thanks #Nikhil Parekh." - Dr Raihan Kabir

Also, here's a 1 star review:

"Waste of my money

Did not learn anything usefull"

and a 2 star review by William C. Husk Jr who has failed to leave any actual review for me to look at so that I can improve this course.

When you take this course, you are covered by a 30 day full money back guarantee. So there is no waste of money ever if you ask for a refund if this product is not suitable to you. Please look at the number of 5 star reviews before you make a decision on taking my course.

You are about to be introduced to one of the most powerful penetration testing platforms in the world. Kali Linux

Kali Linux is one of the most versatile penetration testing platforms favored by ethical hackers.

This course will introduce you to Kali Linux and explain step by step how to install Kali Linux in a virtual environment on a Windows 10 machine.

You will learn how to install Kali Linux, set up the root username and password, install VirtualBox guest additions, Linux kernels and much more!

All videos are recorded in HD quality and you will be able to follow along as the lessons are spoken in clear English.

You will also be introduced to Nmap and how to use it for security scanning, port scanning and network exploration.

The videos will also guide you on how to install a wireless card within the virtual environment so you can scan wireless networks and devices and take advantage of many of the wireless security tools available in the Kali Linux environment.

You will also learn how hackers use Malware to infect a victim's computer. In addition, you will also be introduced to Python and how to use it for ethical hacking purposes.

Take this course today and start your Ethical Hacking journey now!

تحديث بتاريخ 27 December, 2017
دورات يمكنك الالتحاق بها على الفور... خذ دورة عبر الإنترنت على Certified Ethical Hacker (CEH) ابتداءً من الآن. See all courses

قيِم هذه الصفحة