Ethical Hacking and Penetration Testing Using Kali Linux

Ethical Hacking and Penetration Testing Using Kali Linux

0 STUDENTS ENROLLED

    Overview

    The Ethical Hacking and Penetration Testing Using Kali Linux is the best way for you to gain deep insight and knowledge of this topic. You will learn from industry experts and obtain an accredited certificate after completing the course. Enrol now for a limited-time discounted price.

    Like all the courses of One Education, this Ethical Hacking and Penetration Testing Using Kali Linux is designed with the utmost attention and thorough research. All the topics are broken down into easy to understand bite-sized modules that help our learners to understand each lesson very easily.

    We don’t just provide courses at One Education; we provide a rich learning experience. After purchasing a course from One Education, you get complete 1-year access with tutor support. 

    Our expert instructors are always available to answer all your questions and make your learning experience exquisite.

    After completing the Ethical Hacking and Penetration Testing Using Kali Linux, you will instantly get an e-certificate that will help you get jobs in the relevant field and will enrich your CV.

    If you want to learn about this topic and achieve certifications, you should consider this Ethical Hacking and Penetration Testing Using Kali Linux from One Education.

    There are no hidden fees or exam charges. We are very upfront and clear about all the costs of the course. 

    Course design

    The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace.

    You are taught through a combination of

    • Video lessons
    • Online study materials

    Will I receive a certificate of completion?

    Upon successful completion, you will qualify for the UK and internationally-recognised certification and you can choose to make your achievement formal by obtaining your PDF Certificate at a cost of £9 and Hard Copy Certificate for £15.

    Why study this course

    Whether you’re an existing practitioner or aspiring professional, this course will enhance your expertise and boost your CV with key skills and an accredited qualification attesting to your knowledge.

    The Ethical Hacking and Penetration Testing Using Kali Linux is open to all, with no formal entry requirements. All you need is a passion for learning, a good understanding of the English language, numeracy and IT, and to be over the age of 16.

    Course Curriculum

    Course Overview
    Course Overview 00:04:00
    Building Your Virtual Lab Environment
    Lab-Creating a Virtual install of Kali using VirtualBox 00:13:00
    Installing the VirtualBox Extension Pack 00:02:00
    Lab-Creating a Virtual Install of CSI Linux 00:13:00
    Lab-Creating an Unattended Virtual Install of XP Using Virtualbox 00:08:00
    Taking a Snapshot of Your Current configuration 00:04:00
    Anonymity - Remaining Anonymous While Browsing Online
    Lab-Anonymize Kali Using Whonix 00:10:00
    Lab-Ensuring Anonymity Using the CSI Linux Gateway 00:13:00
    Assigning a Random MAC Address in Kali 00:07:00
    Passive reconnaissance
    Lab-Information Gathering Using Maltego 00:10:00
    Lab-Conducting OSINT Using CSI Linux Investigator 00:08:00
    Using Metagoofil inside CSI Linux Analyst 00:05:00
    Conducting a Passive Reconnaissance Using Shodan
    Lab-Preparing CSI Analyst to Use Shodan 00:06:00
    Lab-Using Shodan to Find Vulnerable Devices 00:16:00
    Lab-Using Shodan to Search for Vulnerable Databases 00:08:00
    NMap
    Lab-Introduction to NMap 00:17:00
    Lab-NMap Scripting Engine (NSE) 00:19:00
    Lab-Scanning for WannaCry Ransomware 00:14:00
    Scanning for Vulnerabilities Using NESSUS
    Lab-Installing NESSUS Using Docker 00:15:00
    Lab-Scanning for Vulnerabilities Using Nessus 00:11:00
    Using Your Nessus Scan Results 00:12:00
    Scanning for Vulnerabilities Using OpenVAS
    Lab-Installing OpenVAS Using Docker 00:09:00
    Lab – Scanning for Vulnerabilities Using OpenVAS 00:10:00
    Exploiting Windows XP
    Video and Lab- Using Metasploit to Launch a DOS Attack Against Windows XP 00:09:00
    Lab-Establishing A VNC Shell Using Meterpreter 00:18:00
    Lab-Using Meterpreter to backdoor Windows XP 00:12:00
    Lab – Exploiting Vulnerable Applications on Windows XP SP2 01:15:00
    Lab – Hacking Windows XP via MS11-006 Windows Shell Graphics Processing 01:05:00
    NetCat
    Creating a Virtual Install of Server 2008 Using virtualBox 00:07:00
    Lab-Create Reverse Shell Using MS09_050 00:12:00
    Exploiting Linux
    Lab-Installing Metasploitable2 Using VirtualBox 00:10:00
    Lab – Learning to Hack Linux Using Metasploitable2 01:10:00
    Lab – Exploring Endpoint Attacks 01:35:00
    Social Engineering
    Lab-Using the Social Engineering Toolkit (SET) 00:07:00
    BASH Scripting for Pentesters
    Lab-Introduction to BASH Scripting 00:08:00
    Lab-Creating a BASH Script for Linux Fedora Part-1 00:11:00
    Lab-Creating a BASH Script for Linux Fedora Part-2 00:30:00
    Password Cracking
    Lab – Password Cracking Using Medusa 00:06:00
    Lab-Passwords Cracking Using Mimikatz 00:11:00
    Lab-Password Cracking Using Hydra 00:05:00
    Web Based Application Attacks
    Lab-Installing w3af in Kali Linux Using Docker 00:13:00
    Lab – Conducting A Website Vulnerability Scan Using w3af 00:05:00
    Lab – Performing a Browser Based Attack 00:12:00
    Lab-SQL Injection Attack Using SQLmap 00:12:00
    Browser Exploitation Framework (BeEF)
    Configure Kali for Exploitation the WAN 00:16:00
    Lab-The Browser Exploitation Framework (BeEF) 00:19:00
    Capture the Flag Walkthrough - Mr. Robot
    Lab file – Capture the Flag (CTF) – Mr. Robot 02:25:00
    Video Walk Through -Key #1 00:13:00
    Video Walk through – Key #2 00:19:00
    Video Walk Through – Key #3 00:08:00
    Capture the Flag Walkthrough – Stapler
    Lab File – Walkthrough – CTF – Stapler 02:40:00
    Capture the Flag – Stapler Part 1 00:18:00
    Capture the Flag – Stapler Part 2 00:17:00
    Capture the Flag – Stapler Part 3 00:17:00
    Bonus - Digital Forensics Case Management
    Attaching an External USB Device in Kali 00:07:00
    Lab -Digital Forensics Using Autopsy Part I 00:11:00
    Lab-Digital Forensics Using Autopsy Part II 00:07:00

    Course Reviews

    N.A

    0
    0 ratings
    • 5 stars0
    • 4 stars0
    • 3 stars0
    • 2 stars0
    • 1 stars0

    No Reviews found for this course.

    TAKE THIS COURSE

     

     

    COPYRIGHT © 2021 One Education