
第 1 季
24 集
The Course Overview - 1

The Course Overview - 1
This video provides an overview of the entire course.
Introducing Kali Linux - 2

Introducing Kali Linux - 2
This video aims to introduce you to Kali Linux.
Getting Familiar with Hardware Requirements and Recommendations - 3

Getting Familiar with Hardware Requirements and Recommendations - 3
This video discusses the required hardware and software that will allow us to install and run Kali Linux.
Installing Kali Linux in VirtualBox - 4

Installing Kali Linux in VirtualBox - 4
Installing Kali Linux in a virtual environment.
Installing Kali Linux on Raspberry Pi - 5

Installing Kali Linux on Raspberry Pi - 5
This video shows how to install Kali Linux on a Raspberry Pi device.
Introducing Kali Linux Interface and Tools - 6

Introducing Kali Linux Interface and Tools - 6
This video gives a brief introduction to the Kali Linux interface and tools.
Networking Fundamentals - 8

Networking Fundamentals - 8
Some of the networking fundamentals and terms that we are going to use throughout this course.
Creating a Pen-Testing Lab Environment - 9

Creating a Pen-Testing Lab Environment - 9
Why is it important to have a pen-testing lab environment?
What Is Penetration Testing? - 10

What Is Penetration Testing? - 10
In this video, we will discuss what penetration testing is and why you might want to learn it.
Reconnaissance - 11

Reconnaissance - 11
This video represents a short introduction to the first phase of pen-testing-reconnaissance.
Getting Familiar with Vulnerability Scanning - 12

Getting Familiar with Vulnerability Scanning - 12
What is vulnerability scanning?
Gaining and Maintaining Access - 13

Gaining and Maintaining Access - 13
Third phase of pen-testing-gaining and maintaining access.
Gathering Initial Information - 15

Gathering Initial Information - 15
Obtain passive information about our target.
Identifying Live Hosts - 16

Identifying Live Hosts - 16
It's time to perform some active reconnaissance.
Discovering Open Ports - 17

Discovering Open Ports - 17
Using Kali Linux tools, we try to discover the open ports available in our target machine.
Uncovering Services and Fingerprinting the OS - 18

Uncovering Services and Fingerprinting the OS - 18
Discover the services that are running on our target machine and its operating system.
Vulnerability Scanning with OpenVAS - 19

Vulnerability Scanning with OpenVAS - 19
Discovering vulnerabilities in our target system using the OpenVAS vulnerability scanner.
Vulnerability Scanning with Nessus - 20

Vulnerability Scanning with Nessus - 20
Discover the services that are vulnerable on our target system using the Nessus scanner.
Exploiting the Target System - 21

Exploiting the Target System - 21
Time to exploit the vulnerabilities found on our target system.
Cracking the System Passwords - 22

Cracking the System Passwords - 22
We copied the system passwords from the target machine to our Kali Linux machine. Now it's time to crack those passwords.
Defensive CounterMeasures - 24

Defensive CounterMeasures - 24
What can a system administrator do against these hacking attacks?












