Ethical Hacking – Basics (Kali 2021)
Ethical Hacking – Basics (Kali 2021), available at Free, has an average rating of 4.06, with 21 lectures, based on 1031 reviews, and has 70601 subscribers.
You will learn about An introduction to attacking networks and breaking passwords. A clear understanding of what ethical hacking and penetration testing is. Setting up Kali Linux Overview of tools in Kali This course is ideal for individuals who are Anybody who want to learn about Ethical Hacking or Any person willing to learn how to make their own penetration testing lab It is particularly useful for Anybody who want to learn about Ethical Hacking or Any person willing to learn how to make their own penetration testing lab.
Enroll now: Ethical Hacking – Basics (Kali 2021)
Summary
Title: Ethical Hacking – Basics (Kali 2021)
Price: Free
Average Rating: 4.06
Number of Lectures: 21
Number of Published Lectures: 19
Number of Curriculum Items: 28
Number of Published Curriculum Objects: 26
Original Price: Free
Quality Status: approved
Status: Live
What You Will Learn
- An introduction to attacking networks and breaking passwords.
- A clear understanding of what ethical hacking and penetration testing is.
- Setting up Kali Linux
- Overview of tools in Kali
Who Should Attend
- Anybody who want to learn about Ethical Hacking
- Any person willing to learn how to make their own penetration testing lab
Target Audiences
- Anybody who want to learn about Ethical Hacking
- Any person willing to learn how to make their own penetration testing lab
Kali is a penetration testing Linux distribution created by Offensive Security. It holds a repository of multiple tools for security-related engineers including hacking wireless networks, web applications, databases, Reverse engineering, password crackers, and much more! As you can see, Kali is a versatile and powerful tool for anyone looking to do any cybersecurity-related work.
Keep in mind this is a basics course, which means this course is a beginner’s guide to getting started in Kali…to get your feet wet. The course is broken down into several sections focusing on certain aspects of the ethical hacking process. Starting off with an overview of Kali and its use cases then offer a step-by-step walkthrough of installing Kali using VMware. Next, we teach you some important configuration settings in the distribution including configuring your network and managing services in Kali. Knowing these procedures will help you set up the proper environments when using Kali and its tools.
We will cover the five phases and the tools used in each phase, again this is an introduction so we may not go super in-depth but you will leave with a basic understanding of how to do things and why they are done in each phase. Because of issues with Udemy free courses being less than two hours I am not able to add additional content. However, I will be publishing more free courses. I will be publishing a more focused Course on each of the phases.
The goal is to provide you with basic knowledge to get you started so you can take it from there. Remember this is not a field that you have can walkthrough. You will have to grow and adapt as the environment changes.
Course Curriculum
Chapter 1: Introduction
Lecture 1: Introduction
Lecture 2: What's New in Kali
Lecture 3: Setting up the Lab Environment
Lecture 4: Updating Kali
Lecture 5: Basics of Ethical Hacking
Lecture 6: Understanding Methodology
Chapter 2: Phase 1 – Reconnaissance
Lecture 1: Overview – Reconnaissance
Lecture 2: Recon Tool – Spiderfoot
Chapter 3: Phase 2 – Scanning
Lecture 1: Overview – Scanning
Lecture 2: Scanning Tool – NMAP Basic
Chapter 4: Phase 3 – Gaining Access
Lecture 1: Overview – Gaining Access
Lecture 2: Creating Exploit Tool – Metasploit Basic
Lecture 3: Cracking Hashes – Hashcat
Lecture 4: Cracking Password – Hashcat
Chapter 5: Phase 4 – Maintaining Access
Lecture 1: Overview – Maintaining Access
Lecture 2: Uploading second Malware Tool – Maintaining Access
Chapter 6: Phase 5 – Clearing Tracks
Lecture 1: Overview – Clearing Tracks
Lecture 2: Meterpreter Clearing Logs Tool – Clearing Tracks
Chapter 7: Wrap-up
Lecture 1: BONUS
Instructors
-
Arthur Salmon
Skilled Cyber & Networking Instructor
Rating Distribution
- 1 stars: 33 votes
- 2 stars: 36 votes
- 3 stars: 162 votes
- 4 stars: 314 votes
- 5 stars: 486 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Language Learning Courses to Learn in November 2024
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024