Learning Network Penetration Testing with Kali Linux

Learning Network Penetration Testing with Kali Linux

Sesong 1
Learn how to test your network against various types of attacks. We will teach viewers how to install Kali Linux, discuss about different phases of pen testing, etc. By the end of this section you will become familiar with the tools that Kali Linux offers to perform network penetration testing, how to exploit the vulnerable systems and how to patch them.
201724 episoderALLE
Tilgjengelig for kjøp

Episoder

  1. S1 E1 - The Course Overview

    23. april 2017
    4min
    ALLE
    This video provides an overview of the entire course.
    Tilgjengelig for kjøp
  2. S1 E2 - Introducing Kali Linux

    23. april 2017
    5min
    ALLE
    This video aims to introduce you to Kali Linux.
    Tilgjengelig for kjøp
  3. S1 E3 - Getting Familiar with Hardware Requirements and Recommendations

    23. april 2017
    4min
    ALLE
    This video discusses the required hardware and software that will allow us to install and run Kali Linux.
    Tilgjengelig for kjøp
  4. S1 E4 - Installing Kali Linux in VirtualBox

    23. april 2017
    14min
    ALLE
    Installing Kali Linux in a virtual environment.
    Tilgjengelig for kjøp
  5. S1 E5 - Installing Kali Linux on Raspberry Pi

    23. april 2017
    13min
    ALLE
    This video shows how to install Kali Linux on a Raspberry Pi device.
    Tilgjengelig for kjøp
  6. S1 E6 - Introducing Kali Linux Interface and Tools

    23. april 2017
    8min
    ALLE
    This video gives a brief introduction to the Kali Linux interface and tools.
    Tilgjengelig for kjøp
  7. S1 E7 - Updating Kali Linux

    23. april 2017
    6min
    ALLE
    Keeping Kali Linux up to date.
    Tilgjengelig for kjøp
  8. S1 E8 - Networking Fundamentals

    23. april 2017
    13min
    ALLE
    Some of the networking fundamentals and terms that we are going to use throughout this course.
    Tilgjengelig for kjøp
  9. S1 E9 - Creating a Pen-Testing Lab Environment

    23. april 2017
    9min
    ALLE
    Why is it important to have a pen-testing lab environment?
    Tilgjengelig for kjøp
  10. S1 E10 - What Is Penetration Testing?

    23. april 2017
    5min
    ALLE
    In this video, we will discuss what penetration testing is and why you might want to learn it.
    Tilgjengelig for kjøp
  11. S1 E11 - Reconnaissance

    23. april 2017
    8min
    ALLE
    This video represents a short introduction to the first phase of pen-testing-reconnaissance.
    Tilgjengelig for kjøp
  12. S1 E12 - Getting Familiar with Vulnerability Scanning

    23. april 2017
    3min
    ALLE
    What is vulnerability scanning?
    Tilgjengelig for kjøp
  13. S1 E13 - Gaining and Maintaining Access

    23. april 2017
    4min
    ALLE
    Third phase of pen-testing-gaining and maintaining access.
    Tilgjengelig for kjøp
  14. S1 E14 - Covering Tracks

    23. april 2017
    2min
    ALLE
    Last phase of a hacking attack-covering tracks.
    Tilgjengelig for kjøp
  15. S1 E15 - Gathering Initial Information

    23. april 2017
    6min
    ALLE
    Obtain passive information about our target.
    Tilgjengelig for kjøp
  16. S1 E16 - Identifying Live Hosts

    23. april 2017
    11min
    ALLE
    It's time to perform some active reconnaissance.
    Tilgjengelig for kjøp
  17. S1 E17 - Discovering Open Ports

    23. april 2017
    10min
    ALLE
    Using Kali Linux tools, we try to discover the open ports available in our target machine.
    Tilgjengelig for kjøp
  18. S1 E18 - Uncovering Services and Fingerprinting the OS

    23. april 2017
    8min
    ALLE
    Discover the services that are running on our target machine and its operating system.
    Tilgjengelig for kjøp
  19. S1 E19 - Vulnerability Scanning with OpenVAS

    23. april 2017
    11min
    ALLE
    Discovering vulnerabilities in our target system using the OpenVAS vulnerability scanner.
    Tilgjengelig for kjøp
  20. S1 E20 - Vulnerability Scanning with Nessus

    23. april 2017
    11min
    ALLE
    Discover the services that are vulnerable on our target system using the Nessus scanner.
    Tilgjengelig for kjøp
  21. S1 E21 - Exploiting the Target System

    23. april 2017
    15min
    ALLE
    Time to exploit the vulnerabilities found on our target system.
    Tilgjengelig for kjøp
  22. S1 E22 - Cracking the System Passwords

    23. april 2017
    7min
    ALLE
    We copied the system passwords from the target machine to our Kali Linux machine. Now it's time to crack those passwords.
    Tilgjengelig for kjøp
  23. S1 E23 - Post Exploitation

    23. april 2017
    4min
    ALLE
    Discussion about the post-exploitation phase.
    Tilgjengelig for kjøp
  24. S1 E24 - Defensive CounterMeasures

    23. april 2017
    5min
    ALLE
    What can a system administrator do against these hacking attacks?
    Tilgjengelig for kjøp