Learning Network Penetration Testing with Kali Linux

Learning Network Penetration Testing with Kali Linux

可供购买
Learn how to test your network against various types of attacks. We will teach viewers how to install Kali Linux, discuss about different phases of pen testing, etc. By the end of this section you will become familiar with the tools that Kali Linux offers to perform network penetration testing, how to exploit the vulnerable systems and how to patch them.
2017第 1 季
全部
24 集
  • The Course Overview - 1

    The Course Overview - 1

    This video provides an overview of the entire course.
    This video provides an overview of the entire course.
    全部
    4 分钟
    2017年4月23日
  • Introducing Kali Linux - 2

    Introducing Kali Linux - 2

    This video aims to introduce you to Kali Linux.
    This video aims to introduce you to Kali Linux.
    全部
    5 分钟
    2017年4月23日
  • Getting Familiar with Hardware Requirements and Recommendations - 3

    Getting Familiar with Hardware Requirements and Recommendations - 3

    This video discusses the required hardware and software that will allow us to install and run Kali Linux.
    This video discusses the required hardware and software that will allow us to install and run Kali Linux.
    全部
    4 分钟
    2017年4月23日
  • Installing Kali Linux in VirtualBox - 4

    Installing Kali Linux in VirtualBox - 4

    Installing Kali Linux in a virtual environment.
    Installing Kali Linux in a virtual environment.
    全部
    14 分钟
    2017年4月23日
  • Installing Kali Linux on Raspberry Pi - 5

    Installing Kali Linux on Raspberry Pi - 5

    This video shows how to install Kali Linux on a Raspberry Pi device.
    This video shows how to install Kali Linux on a Raspberry Pi device.
    全部
    13 分钟
    2017年4月23日
  • Introducing Kali Linux Interface and Tools - 6

    Introducing Kali Linux Interface and Tools - 6

    This video gives a brief introduction to the Kali Linux interface and tools.
    This video gives a brief introduction to the Kali Linux interface and tools.
    全部
    8 分钟
    2017年4月23日
  • Updating Kali Linux - 7

    Updating Kali Linux - 7

    Keeping Kali Linux up to date.
    Keeping Kali Linux up to date.
    全部
    6 分钟
    2017年4月23日
  • Networking Fundamentals - 8

    Networking Fundamentals - 8

    Some of the networking fundamentals and terms that we are going to use throughout this course.
    Some of the networking fundamentals and terms that we are going to use throughout this course.
    全部
    13 分钟
    2017年4月23日
  • Creating a Pen-Testing Lab Environment - 9

    Creating a Pen-Testing Lab Environment - 9

    Why is it important to have a pen-testing lab environment?
    Why is it important to have a pen-testing lab environment?
    全部
    9 分钟
    2017年4月23日
  • What Is Penetration Testing? - 10

    What Is Penetration Testing? - 10

    In this video, we will discuss what penetration testing is and why you might want to learn it.
    In this video, we will discuss what penetration testing is and why you might want to learn it.
    全部
    5 分钟
    2017年4月23日
  • Reconnaissance - 11

    Reconnaissance - 11

    This video represents a short introduction to the first phase of pen-testing-reconnaissance.
    This video represents a short introduction to the first phase of pen-testing-reconnaissance.
    全部
    8 分钟
    2017年4月23日
  • Getting Familiar with Vulnerability Scanning - 12

    Getting Familiar with Vulnerability Scanning - 12

    What is vulnerability scanning?
    What is vulnerability scanning?
    全部
    3 分钟
    2017年4月23日
  • Gaining and Maintaining Access - 13

    Gaining and Maintaining Access - 13

    Third phase of pen-testing-gaining and maintaining access.
    Third phase of pen-testing-gaining and maintaining access.
    全部
    4 分钟
    2017年4月23日
  • Covering Tracks - 14

    Covering Tracks - 14

    Last phase of a hacking attack-covering tracks.
    Last phase of a hacking attack-covering tracks.
    全部
    2 分钟
    2017年4月23日
  • Gathering Initial Information - 15

    Gathering Initial Information - 15

    Obtain passive information about our target.
    Obtain passive information about our target.
    全部
    6 分钟
    2017年4月23日
  • Identifying Live Hosts - 16

    Identifying Live Hosts - 16

    It's time to perform some active reconnaissance.
    It's time to perform some active reconnaissance.
    全部
    11 分钟
    2017年4月23日
  • Discovering Open Ports - 17

    Discovering Open Ports - 17

    Using Kali Linux tools, we try to discover the open ports available in our target machine.
    Using Kali Linux tools, we try to discover the open ports available in our target machine.
    全部
    10 分钟
    2017年4月23日
  • Uncovering Services and Fingerprinting the OS - 18

    Uncovering Services and Fingerprinting the OS - 18

    Discover the services that are running on our target machine and its operating system.
    Discover the services that are running on our target machine and its operating system.
    全部
    8 分钟
    2017年4月23日
  • Vulnerability Scanning with OpenVAS - 19

    Vulnerability Scanning with OpenVAS - 19

    Discovering vulnerabilities in our target system using the OpenVAS vulnerability scanner.
    Discovering vulnerabilities in our target system using the OpenVAS vulnerability scanner.
    全部
    11 分钟
    2017年4月23日
  • Vulnerability Scanning with Nessus - 20

    Vulnerability Scanning with Nessus - 20

    Discover the services that are vulnerable on our target system using the Nessus scanner.
    Discover the services that are vulnerable on our target system using the Nessus scanner.
    全部
    11 分钟
    2017年4月23日
  • Exploiting the Target System - 21

    Exploiting the Target System - 21

    Time to exploit the vulnerabilities found on our target system.
    Time to exploit the vulnerabilities found on our target system.
    全部
    15 分钟
    2017年4月23日
  • Cracking the System Passwords - 22

    Cracking the System Passwords - 22

    We copied the system passwords from the target machine to our Kali Linux machine. Now it's time to crack those passwords.
    We copied the system passwords from the target machine to our Kali Linux machine. Now it's time to crack those passwords.
    全部
    7 分钟
    2017年4月23日
  • Post Exploitation - 23

    Post Exploitation - 23

    Discussion about the post-exploitation phase.
    Discussion about the post-exploitation phase.
    全部
    4 分钟
    2017年4月23日
  • Defensive CounterMeasures - 24

    Defensive CounterMeasures - 24

    What can a system administrator do against these hacking attacks?
    What can a system administrator do against these hacking attacks?
    全部
    5 分钟
    2017年4月23日
  • Learning Network Penetration Testing with Kali Linux
    2017第 1 季
    Learn how to test your network against various types of attacks. We will teach viewers how to install Kali Linux, discuss about different phases of pen testing, etc. By the end of this section you will become familiar with the tools that Kali Linux offers to perform network penetration testing, how to exploit the vulnerable systems and how to patch them.
    创作者和演职人员
    演员
    Cristian Gradisteanu
    工作室
    Packt Publishing
    评论
    1. 5 星
      0%
    2. 4 星
      0%
    3. 3 星
      0%
    4. 2 星
      0%
    5. 1 星
      0%
    阅读所有评论
    音频语言
    English
    字幕
    English [CC]
    订购或观看即表示您同意我们的条款。由 Amazon.com Services LLC 出售。

    反馈