Penetration Testing with KALI and More: All You Need to Know
Penetration Testing with KALI and More: All You Need to Know, available at $59.99, has an average rating of 4.4, with 85 lectures, based on 981 reviews, and has 44693 subscribers.
You will learn about Learn simplified ethical hacking techniques from scratch Perform an actual Mobile attack Master 2 smart techniques to crack into wireless networks Learn more than 9 ways to perform LAN attacks Learn Linux basics Learn 10+ web application attacks Learn more than 5 proven methods of Social Engineering attacks Obtain 20+ skills any penetration tester needs to succeed Make better decisions on how to protect your applications and network Upgrade your information security skills for a new job or career change Learn how to write a professional penetration testing report Course is constantly being updated, so the knowledge you will acquire will always be applicable This course is ideal for individuals who are Anyone who wants to learn how to secure their systems from hacker or Anyone who wants to learn how hackers can attack their computer systems or Anyone looking to become a penetration tester (From zero to hero) or Computer Science, Computer Security, and Computer Engineering Students It is particularly useful for Anyone who wants to learn how to secure their systems from hacker or Anyone who wants to learn how hackers can attack their computer systems or Anyone looking to become a penetration tester (From zero to hero) or Computer Science, Computer Security, and Computer Engineering Students.
Enroll now: Penetration Testing with KALI and More: All You Need to Know
Summary
Title: Penetration Testing with KALI and More: All You Need to Know
Price: $59.99
Average Rating: 4.4
Number of Lectures: 85
Number of Published Lectures: 84
Number of Curriculum Items: 85
Number of Published Curriculum Objects: 84
Original Price: $19.99
Quality Status: approved
Status: Live
What You Will Learn
- Learn simplified ethical hacking techniques from scratch
- Perform an actual Mobile attack
- Master 2 smart techniques to crack into wireless networks
- Learn more than 9 ways to perform LAN attacks
- Learn Linux basics
- Learn 10+ web application attacks
- Learn more than 5 proven methods of Social Engineering attacks
- Obtain 20+ skills any penetration tester needs to succeed
- Make better decisions on how to protect your applications and network
- Upgrade your information security skills for a new job or career change
- Learn how to write a professional penetration testing report
- Course is constantly being updated, so the knowledge you will acquire will always be applicable
Who Should Attend
- Anyone who wants to learn how to secure their systems from hacker
- Anyone who wants to learn how hackers can attack their computer systems
- Anyone looking to become a penetration tester (From zero to hero)
- Computer Science, Computer Security, and Computer Engineering Students
Target Audiences
- Anyone who wants to learn how to secure their systems from hacker
- Anyone who wants to learn how hackers can attack their computer systems
- Anyone looking to become a penetration tester (From zero to hero)
- Computer Science, Computer Security, and Computer Engineering Students
Welcome to this comprehensive course on penetration testing with KALI. The course examines the various penetration testing concepts and techniquesemployed in a modern ubiquitous computing world, and will take you from a beginner to a more advanced level. We will discuss various topics ranging from traditional to many modern ones, such as Networkingsecurity, Linuxsecurity, Web Applicationsstructure and security, Mobile Applicationsarchitecture and security, Hardwaresecurity, and the hot topic of IoTsecurity. At the end of the course, I will show you some real attacks. Course is constantly being updated, so the knowledge you will acquire will always be applicable.
The layout of the course is easy to walk-through, and the videos are made shortand engaging. My purpose is to present you with case exposition and show you live demos, while utilizing a large set of KALI tools (Enumeration, Scanning, Exploitation, Persistence Access, Reporting and Social Engineering tools) in order to get you started quickly. The necessary resources and tools are posted for each sections of the course.
Before jumping into penetration testing, you will first learn how to set up your own lab and install the needed software to practice Penetration Testing along with me. All the attacks explained in this course are launched against real devices, and nothing is theoretical. The course will demonstrate how to fully control victims’ devices such as servers, workstations, and mobile phones. The course can also be interesting to those looking for quick hacks such as controlling victim’s camera, screen, mobile contacts, emails and SMS messages.
At the end of the course you will be equipped with the necessary tools and skills to:
1) Assess security risks by adopting a standard Threat Modeling technique
2) Adopt a structured approach to perform Penetration Tests
3) Protect yourself and the organization you work at
4) Compile security findings and present them professionally to your clients
5) Make the world a safer place
You can as well enjoy the JUICY BONUS section at the end of the course, which shows you how to setup useful portable Pentest Hardware Tools that you can employ in your attacks.
I have put my 14 years of experience into this course by trying to answer many of the questions I had during my journey of learning. I have as well took the feedback and input of many of my students, peers, and professional figures.
I will be happy to answer all your inquiries and connect with you.
Join TODAY and enjoy a life-time access.
PS: The course is available in Arabic as well as Russian versions.
Hack Ethically !
Course Curriculum
Chapter 1: Introduction
Lecture 1: The Undeniable Power of Ethical Hacking
Chapter 2: Setup Your Lab
Lecture 1: Why KALI
Lecture 2: Different Installation Methods
Lecture 3: Install KALI
Lecture 4: Color Coding for Root User
Lecture 5: Install Windows (Victim's Machine)
Chapter 3: Explore KALI
Lecture 1: Master KALI Desktop Environment
Lecture 2: Color Coding
Chapter 4: Setup Your KALI Server
Lecture 1: Get Started with Linux Commands
Lecture 2: Explore Main Services and Programs
Chapter 5: Steps to Plan a Successful Penetration Test
Lecture 1: Penetration Testing Cycle
Lecture 2: Threat Modeling
Chapter 6: 9+ Ways to Attack a Network
Lecture 1: Wireshark Simplified
Lecture 2: How Does Port Scanning Work
Lecture 3: Introducing NMAP
Lecture 4: Understand NETBIOS and SMB Attacks
Lecture 5: NMAP and ZENMAP Simplified
Lecture 6: Execute Man-in-the-Middle Attacks
Lecture 7: Perform a DNS Spoofing Attack
Lecture 8: Identify a DNS Zone Transfer Vulnerability
Lecture 9: Plan DOS and DDOS Attacks
Lecture 10: All-in-one Metasploit Framework
Lecture 11: Transfer the Payload to a Windows Machine
Lecture 12: Create Your First Trojan and Infiltrate a Target
Lecture 13: Explore The Powerful Armitage Tool
Lecture 14: Hide a Payload in a JPEG Image
Chapter 7: Attack Modern Wireless Networks
Lecture 1: Introduction
Lecture 2: WEP Cracking
Lecture 3: WPA and WPA2 Cracking
Lecture 4: WPS Cracking
Lecture 5: Tips to Improve Your Wireless Network Security
Chapter 8: 4+ Ways to Attack a Web Application
Lecture 1: Web Applications Security Overview
Lecture 2: Web Applications Attack Surface
Lecture 3: Metasploitable VM
Lecture 4: Injection Vulnerabilities
Lecture 5: Broken Authentication Vulnerabilities
Lecture 6: Sensitive Data Exposure Vulnerabilities
Lecture 7: XML External Entities (XXE) Vulnerabilities
Lecture 8: Broken Access Control Vulnerabilities
Lecture 9: Security Misconfiguration Vulnerabilities
Lecture 10: Cross-Site Scripting (XSS) Vulnerabilities
Lecture 11: Insecure Deserialization Vulnerabilities
Lecture 12: Using Components with Known Vulnerabilities
Lecture 13: Insufficient Logging & Monitoring Vulnerabilities
Lecture 14: Additional Risks to Consider
Lecture 15: Discover Vulnerabilities in Websites
Lecture 16: Control Database Server with SQLMap
Lecture 17: Easily Hack a WordPress Site
Lecture 18: Intercept, Analyze, and Replay Web Traffic
Chapter 9: Simple Ways to Gain Access
Lecture 1: Various Password Attacks
Lecture 2: Hashing in a Nutshell
Lecture 3: Execute an Offline Password Attack on Linux
Lecture 4: Execute an Offline Password Attack on Windows
Lecture 5: Run an Online Password Attack on Linux
Lecture 6: Run an Online Password Attack on a Router
Lecture 7: Crack Passwords with Rainbow Tables
Lecture 8: Design Effective Wordlists
Lecture 9: Password Management Tips
Chapter 10: Proven Social Engineering Techniques
Lecture 1: Attack Vectors
Lecture 2: Open-source Intelligence (OSINT)
Lecture 3: Google Dorks Live Examples
Lecture 4: Track and Spoof Emails Easily
Lecture 5: Collect and Visualize Data with Maltego
Lecture 6: Execute a Phishing Attack
Lecture 7: Hack Facebook, Twitter, and Gmail Accounts
Chapter 11: Attack Mobile Phones
Lecture 1: Mobile Attack Surface
Lecture 2: Decrypt SSL Session
Lecture 3: Reverse Engineer an Android Application
Lecture 4: Hack an Android Phone and Download its Contacts
Chapter 12: Maintain Access
Lecture 1: Post-Exploitation Terminologies
Lecture 2: Backdoor Tools Explained
Lecture 3: Netcat Simplified
Lecture 4: Install a Backdoor
Lecture 5: Deface a Website in Few Seconds
Lecture 6: Create a Simple Ransomware
Lecture 7: Understand Hidden Tear Ransomware
Lecture 8: Bypass Firewalls by Tunneling Data and Commands over DNS
Chapter 13: Let’s Get Real
Lecture 1: Publish Your Weapons Online
Lecture 2: Stay Anonymous Online
Lecture 3: Setup a Stealthy Command and Control Center Online
Chapter 14: How to Prepare and Present Your Report
Lecture 1: Report Writing Techniques
Lecture 2: How Can Pentest.ws Help You
Chapter 15: Secret Sauce BONUS
Lecture 1: Create a WiFi Jammer
Lecture 2: Create a $3 Rubber Ducky Key-logger
Instructors
-
Mohamad Mahjoub
Cyber Security Expert
Rating Distribution
- 1 stars: 15 votes
- 2 stars: 18 votes
- 3 stars: 139 votes
- 4 stars: 347 votes
- 5 stars: 462 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024