Ethical Hacking and Penetration Testing Using Kali Linux
The Ethical Hacking and Penetration Testing Using Kali Linux is the best way for you to gain deep insight and knowledge of this topic. You will learn from industry experts and obtain an accredited certificate after completing the course. Enrol now for a limited-time discounted price.
Like all the courses of One Education, this Ethical Hacking and Penetration Testing Using Kali Linux is designed with the utmost attention and thorough research. All the topics are broken down into easy to understand bite-sized modules that help our learners to understand each lesson very easily.
We don’t just provide courses at One Education; we provide a rich learning experience. After purchasing a course from One Education, you get complete 1-year access with tutor support.
Our expert instructors are always available to answer all your questions and make your learning experience exquisite.
After completing the Ethical Hacking and Penetration Testing Using Kali Linux, you will instantly get an e-certificate that will help you get jobs in the relevant field and will enrich your CV.
If you want to learn about this topic and achieve certifications, you should consider this Ethical Hacking and Penetration Testing Using Kali Linux from One Education.
There are no hidden fees or exam charges. We are very upfront and clear about all the costs of the course.
The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace.
You are taught through a combination of
- Video lessons
- Online study materials
Will I receive a certificate of completion?
Upon successful completion, you will qualify for the UK and internationally-recognised certification and you can choose to make your achievement formal by obtaining your PDF Certificate at a cost of £9 and Hard Copy Certificate for £15.
Why study this course
Whether you’re an existing practitioner or aspiring professional, this course will enhance your expertise and boost your CV with key skills and an accredited qualification attesting to your knowledge.
The Ethical Hacking and Penetration Testing Using Kali Linux is open to all, with no formal entry requirements. All you need is a passion for learning, a good understanding of the English language, numeracy and IT, and to be over the age of 16.
|Building Your Virtual Lab Environment|
|Lab-Creating a Virtual install of Kali using VirtualBox||00:13:00|
|Installing the VirtualBox Extension Pack||00:02:00|
|Lab-Creating a Virtual Install of CSI Linux||00:13:00|
|Lab-Creating an Unattended Virtual Install of XP Using Virtualbox||00:08:00|
|Taking a Snapshot of Your Current configuration||00:04:00|
|Anonymity - Remaining Anonymous While Browsing Online|
|Lab-Anonymize Kali Using Whonix||00:10:00|
|Lab-Ensuring Anonymity Using the CSI Linux Gateway||00:13:00|
|Assigning a Random MAC Address in Kali||00:07:00|
|Lab-Information Gathering Using Maltego||00:10:00|
|Lab-Conducting OSINT Using CSI Linux Investigator||00:08:00|
|Using Metagoofil inside CSI Linux Analyst||00:05:00|
|Conducting a Passive Reconnaissance Using Shodan|
|Lab-Preparing CSI Analyst to Use Shodan||00:06:00|
|Lab-Using Shodan to Find Vulnerable Devices||00:16:00|
|Lab-Using Shodan to Search for Vulnerable Databases||00:08:00|
|Lab-Introduction to NMap||00:17:00|
|Lab-NMap Scripting Engine (NSE)||00:19:00|
|Lab-Scanning for WannaCry Ransomware||00:14:00|
|Scanning for Vulnerabilities Using NESSUS|
|Lab-Installing NESSUS Using Docker||00:15:00|
|Lab-Scanning for Vulnerabilities Using Nessus||00:11:00|
|Using Your Nessus Scan Results||00:12:00|
|Scanning for Vulnerabilities Using OpenVAS|
|Lab-Installing OpenVAS Using Docker||00:09:00|
|Lab – Scanning for Vulnerabilities Using OpenVAS||00:10:00|
|Exploiting Windows XP|
|Video and Lab- Using Metasploit to Launch a DOS Attack Against Windows XP||00:09:00|
|Lab-Establishing A VNC Shell Using Meterpreter||00:18:00|
|Lab-Using Meterpreter to backdoor Windows XP||00:12:00|
|Lab – Exploiting Vulnerable Applications on Windows XP SP2||01:15:00|
|Lab – Hacking Windows XP via MS11-006 Windows Shell Graphics Processing||01:05:00|
|Creating a Virtual Install of Server 2008 Using virtualBox||00:07:00|
|Lab-Create Reverse Shell Using MS09_050||00:12:00|
|Lab-Installing Metasploitable2 Using VirtualBox||00:10:00|
|Lab – Learning to Hack Linux Using Metasploitable2||01:10:00|
|Lab – Exploring Endpoint Attacks||01:35:00|
|Lab-Using the Social Engineering Toolkit (SET)||00:07:00|
|BASH Scripting for Pentesters|
|Lab-Introduction to BASH Scripting||00:08:00|
|Lab-Creating a BASH Script for Linux Fedora Part-1||00:11:00|
|Lab-Creating a BASH Script for Linux Fedora Part-2||00:30:00|
|Lab – Password Cracking Using Medusa||00:06:00|
|Lab-Passwords Cracking Using Mimikatz||00:11:00|
|Lab-Password Cracking Using Hydra||00:05:00|
|Web Based Application Attacks|
|Lab-Installing w3af in Kali Linux Using Docker||00:13:00|
|Lab – Conducting A Website Vulnerability Scan Using w3af||00:05:00|
|Lab – Performing a Browser Based Attack||00:12:00|
|Lab-SQL Injection Attack Using SQLmap||00:12:00|
|Browser Exploitation Framework (BeEF)|
|Configure Kali for Exploitation the WAN||00:16:00|
|Lab-The Browser Exploitation Framework (BeEF)||00:19:00|
|Capture the Flag Walkthrough - Mr. Robot|
|Lab file – Capture the Flag (CTF) – Mr. Robot||02:25:00|
|Video Walk Through -Key #1||00:13:00|
|Video Walk through – Key #2||00:19:00|
|Video Walk Through – Key #3||00:08:00|
|Capture the Flag Walkthrough – Stapler|
|Lab File – Walkthrough – CTF – Stapler||02:40:00|
|Capture the Flag – Stapler Part 1||00:18:00|
|Capture the Flag – Stapler Part 2||00:17:00|
|Capture the Flag – Stapler Part 3||00:17:00|
|Bonus - Digital Forensics Case Management|
|Attaching an External USB Device in Kali||00:07:00|
|Lab -Digital Forensics Using Autopsy Part I||00:11:00|
|Lab-Digital Forensics Using Autopsy Part II||00:07:00|
No Reviews found for this course.