Linux and Windows Pentesting with Python and Kali Linux
Linux and Windows Pentesting with Python and Kali Linux, available at $39.99, has an average rating of 3.65, with 62 lectures, 2 quizzes, based on 19 reviews, and has 179 subscribers.
You will learn about How to safeguard your Windows operating system using Kali Linux Setting up your pentesting environment and gather information about the target system Detect vulnerable ports and learn how to exploit them Pentest your website and hack data with different types of attacks How to crack passwords to gain elevated access to resources Gather and present your finding to higher authorities Perform Linux and Windows Pentesting with python. How to Write Python Pentesting Scripts. Performing Endpoint Penetration testing on Victim Machines. This course is ideal for individuals who are Python Developers, IT Professionals, Security Analysts, and Ethical hackers would find this course useful. They would be familiar with the basics of python, as it is greatly used by hackers, reverse engineers, and security professionals. They usually work with planning and implementing security measures to protect computer systems, networks, and data from various data breaches and threats. It is particularly useful for Python Developers, IT Professionals, Security Analysts, and Ethical hackers would find this course useful. They would be familiar with the basics of python, as it is greatly used by hackers, reverse engineers, and security professionals. They usually work with planning and implementing security measures to protect computer systems, networks, and data from various data breaches and threats.
Enroll now: Linux and Windows Pentesting with Python and Kali Linux
Summary
Title: Linux and Windows Pentesting with Python and Kali Linux
Price: $39.99
Average Rating: 3.65
Number of Lectures: 62
Number of Quizzes: 2
Number of Published Lectures: 62
Number of Published Quizzes: 2
Number of Curriculum Items: 64
Number of Published Curriculum Objects: 64
Original Price: $199.99
Quality Status: approved
Status: Live
What You Will Learn
- How to safeguard your Windows operating system using Kali Linux
- Setting up your pentesting environment and gather information about the target system
- Detect vulnerable ports and learn how to exploit them
- Pentest your website and hack data with different types of attacks
- How to crack passwords to gain elevated access to resources
- Gather and present your finding to higher authorities
- Perform Linux and Windows Pentesting with python.
- How to Write Python Pentesting Scripts.
- Performing Endpoint Penetration testing on Victim Machines.
Who Should Attend
- Python Developers, IT Professionals, Security Analysts, and Ethical hackers would find this course useful. They would be familiar with the basics of python, as it is greatly used by hackers, reverse engineers, and security professionals. They usually work with planning and implementing security measures to protect computer systems, networks, and data from various data breaches and threats.
Target Audiences
- Python Developers, IT Professionals, Security Analysts, and Ethical hackers would find this course useful. They would be familiar with the basics of python, as it is greatly used by hackers, reverse engineers, and security professionals. They usually work with planning and implementing security measures to protect computer systems, networks, and data from various data breaches and threats.
Video Learning Path Overview
A Learning Path is a specially tailored course that brings together two or more different topics that lead you to achieve an end goal. Much thought goes into the selection of the assets for a Learning Path, and this is done through a complete understanding of the requirements to achieve a goal.
As hackers become more skilled and sophisticated, it puts the responsibility of business owners to ensure that their cybersecurity systems can protect against threats. One of the most important techniques that companies can use to defend themselves is penetration testing.
This Learning Path is architected to help you not only learn about the threats and safeguarding network, websites but also learn how to penetrate and gain access into the targets system. Beginning with an introduction to penetration testing on the most vulnerable OS, Windows, using Kali Linux you will practically learn to gather information about the target network and websites to discover all the vulnerable ports. Moving on, you’ll break into websites using various pentesting tools and learn how to present your test reports.
Once you are comfortable in using Kali Linux and its well-known tools, you’ll explore another fantastic tool, the Python language. You’ll learn to implement hacking tools and techniques such as debuggers, fuzzers, etc. Furthermore, you’ll be excited in learning to extend the popular Burp Suite web-hacking tool to perform a man-in-the-browser attack, and exfiltrate data from a network most sneakily.
This three-piece-Learning-Path is a practical approach with step by step guide to teach you to use Kali Linux tools along with python scripts. It then helps you exploring the key topics incisively with the combined use of theory and practical demonstrations to help the viewer get a broad understanding of the topic.
Key Features
-
Discover the vast features and programs that Kali Linux holds to perform and carry out a variety of penetration testing tasks.
-
Exploit the most common vulnerabilities in the Windows operating system and understand how attackers take advantage of them.
-
Develop the skills to write and implement Python Scripts to Pentest Linux and Windows Machines.
Author Bios
-
Angelique Keyter is devoted to making a difference in the world of cybercrime. She has numerous years of hacking and lecturing behind her and focuses her time on making a difference in her community and teaching people how to fight an unseen criminal. Angelique is a certified hacker, Linux professional, and Microsoft solutions expert with more than 20 years of experience. She is a mother of twins and spends a lot of time studying new things and learning new concepts. She believes that you are never too old to learn. She has a passion for gaming and geeky stuff from hacking to robotics to forensic psychology. She is a focused person with a witty sense of humor, always ready to help or play football with her boys.
-
Sunil Guptais a Certified Ethical Hacker. Currently, he teaches 50,000+ students online in 170+ countries. He is a specialist in the Ethical Hacking Area. His strengths are Vulnerability Assessment, Penetration Testing, Bug Bounty Hunting, Intrusion Detection, Risk Identification, Data Analysis Report, and Briefing.
Course Curriculum
Chapter 1: Learning Windows Penetration Testing Using Kali Linux
Lecture 1: The Course Overview
Lecture 2: Pre-Installed Kali Linux
Lecture 3: Installing Kali Linux from Scratch
Lecture 4: Updating, Downloading and Installing Apps
Lecture 5: Running Services on Kali
Lecture 6: Understanding Different Types of Tools
Lecture 7: Footprinting the Network
Lecture 8: Manipulating Google
Lecture 9: Scanning with NMAP and Zenmap
Lecture 10: Using Maltego
Lecture 11: Installing OpenVAS
Lecture 12: Scanning with OpenVAS
Lecture 13: Installing Nessus
Lecture 14: Scanning with Nessus
Lecture 15: Exploiting with Metasploit
Lecture 16: Metasploit and MSFvenom
Lecture 17: Using Armitage
Lecture 18: Other Ways to Exploit
Lecture 19: What Is Yuki and How Do We Install It
Lecture 20: Scanning with Yuki
Lecture 21: Installing, Configuring, and Scanning with Sniper
Lecture 22: Using Individual Tools
Lecture 23: Understanding Cross-Site Scripting
Lecture 24: Implementing an XSS Attack
Lecture 25: SQL Injection Theory
Lecture 26: Implementing a SQL Attack
Lecture 27: Cracking Passwords with John the Ripper
Lecture 28: Cracking Passwords with Hydra
Lecture 29: Checking AD Password Strengths of Users
Lecture 30: Using Software to Bypass Local Passwords
Lecture 31: Monitoring Resources
Lecture 32: Gathering Your Findings
Lecture 33: Report Presentation
Chapter 2: Black Hat Python for Pentesters and Hackers
Lecture 1: The Course Overview
Lecture 2: Introduction – Pentesting with Python
Lecture 3: Installation of Virtual Machine
Lecture 4: Installation of Linux and Windows Machines
Lecture 5: Setting Up the Python Development Environment
Lecture 6: Python Variables and Strings
Lecture 7: Python Lists and Dictionaries
Lecture 8: Python Functions and Iteration
Lecture 9: Python Networking and File I/O
Lecture 10: Building a Port Scanner
Lecture 11: TCP Full Connect Scan
Lecture 12: Banner Grabbing
Lecture 13: Integrating Nmap Port Scanner
Lecture 14: Scraping Web Pages
Lecture 15: Phishing Attack
Lecture 16: Mass Mailer Attack
Lecture 17: Research and Discovery
Lecture 18: Introduction – Python Script
Lecture 19: Python Script to Attack on Facebook
Lecture 20: Python Script to Attack on Twitter
Lecture 21: Python Script to Attack on Instagram
Lecture 22: Antivirus Evasion Python Script
Lecture 23: Generate a Payload with Python
Lecture 24: Transfer Payload into the Victim Machine
Lecture 25: Take Complete Access of the Victim Machine
Lecture 26: Introduction – Forensic Investigation
Lecture 27: Read Registry
Lecture 28: Parse Metadata
Lecture 29: Investigating Application Artifacts
Instructors
-
Packt Publishing
Tech Knowledge in Motion
Rating Distribution
- 1 stars: 0 votes
- 2 stars: 1 votes
- 3 stars: 6 votes
- 4 stars: 5 votes
- 5 stars: 7 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024