Learning Network Penetration Testing with Kali Linux

Learning Network Penetration Testing with Kali Linux

متاح للشراء
Learn how to test your network against various types of attacks. We will teach viewers how to install Kali Linux, discuss about different phases of pen testing, etc. By the end of this section you will become familiar with the tools that Kali Linux offers to perform network penetration testing, how to exploit the vulnerable systems and how to patch them.
2017موسم واحد
فريق التمثيل: Cristian Gradisteanu
الكل
24 الحلقات
  • 1. The Course Overview

    1. The Course Overview

    This video provides an overview of the entire course.
    This video provides an overview of the entire course.
    الكل
    4 من الدقائق
    23 أبريل 2017
  • 2. Introducing Kali Linux

    2. Introducing Kali Linux

    This video aims to introduce you to Kali Linux.
    This video aims to introduce you to Kali Linux.
    الكل
    5 من الدقائق
    23 أبريل 2017
  • 3. Getting Familiar with Hardware Requirements and Recommendations

    3. Getting Familiar with Hardware Requirements and Recommendations

    This video discusses the required hardware and software that will allow us to install and run Kali Linux.
    This video discusses the required hardware and software that will allow us to install and run Kali Linux.
    الكل
    4 من الدقائق
    23 أبريل 2017
  • 4. Installing Kali Linux in VirtualBox

    4. Installing Kali Linux in VirtualBox

    Installing Kali Linux in a virtual environment.
    Installing Kali Linux in a virtual environment.
    الكل
    14 من الدقائق
    23 أبريل 2017
  • 5. Installing Kali Linux on Raspberry Pi

    5. Installing Kali Linux on Raspberry Pi

    This video shows how to install Kali Linux on a Raspberry Pi device.
    This video shows how to install Kali Linux on a Raspberry Pi device.
    الكل
    13 من الدقائق
    23 أبريل 2017
  • 6. Introducing Kali Linux Interface and Tools

    6. Introducing Kali Linux Interface and Tools

    This video gives a brief introduction to the Kali Linux interface and tools.
    This video gives a brief introduction to the Kali Linux interface and tools.
    الكل
    8 من الدقائق
    23 أبريل 2017
  • 7. Updating Kali Linux

    7. Updating Kali Linux

    Keeping Kali Linux up to date.
    Keeping Kali Linux up to date.
    الكل
    6 من الدقائق
    23 أبريل 2017
  • 8. Networking Fundamentals

    8. Networking Fundamentals

    Some of the networking fundamentals and terms that we are going to use throughout this course.
    Some of the networking fundamentals and terms that we are going to use throughout this course.
    الكل
    13 من الدقائق
    23 أبريل 2017
  • 9. Creating a Pen-Testing Lab Environment

    9. Creating a Pen-Testing Lab Environment

    Why is it important to have a pen-testing lab environment?
    Why is it important to have a pen-testing lab environment?
    الكل
    9 من الدقائق
    23 أبريل 2017
  • 10. What Is Penetration Testing?

    10. What Is Penetration Testing?

    In this video, we will discuss what penetration testing is and why you might want to learn it.
    In this video, we will discuss what penetration testing is and why you might want to learn it.
    الكل
    5 من الدقائق
    23 أبريل 2017
  • 11. Reconnaissance

    11. Reconnaissance

    This video represents a short introduction to the first phase of pen-testing-reconnaissance.
    This video represents a short introduction to the first phase of pen-testing-reconnaissance.
    الكل
    8 من الدقائق
    23 أبريل 2017
  • 12. Getting Familiar with Vulnerability Scanning

    12. Getting Familiar with Vulnerability Scanning

    What is vulnerability scanning?
    What is vulnerability scanning?
    الكل
    3 من الدقائق
    23 أبريل 2017
  • 13. Gaining and Maintaining Access

    13. Gaining and Maintaining Access

    Third phase of pen-testing-gaining and maintaining access.
    Third phase of pen-testing-gaining and maintaining access.
    الكل
    4 من الدقائق
    23 أبريل 2017
  • 14. Covering Tracks

    14. Covering Tracks

    Last phase of a hacking attack-covering tracks.
    Last phase of a hacking attack-covering tracks.
    الكل
    2 من الدقائق
    23 أبريل 2017
  • 15. Gathering Initial Information

    15. Gathering Initial Information

    Obtain passive information about our target.
    Obtain passive information about our target.
    الكل
    6 من الدقائق
    23 أبريل 2017
  • 16. Identifying Live Hosts

    16. Identifying Live Hosts

    It's time to perform some active reconnaissance.
    It's time to perform some active reconnaissance.
    الكل
    11 من الدقائق
    23 أبريل 2017
  • 17. Discovering Open Ports

    17. Discovering Open Ports

    Using Kali Linux tools, we try to discover the open ports available in our target machine.
    Using Kali Linux tools, we try to discover the open ports available in our target machine.
    الكل
    10 من الدقائق
    23 أبريل 2017
  • 18. Uncovering Services and Fingerprinting the OS

    18. Uncovering Services and Fingerprinting the OS

    Discover the services that are running on our target machine and its operating system.
    Discover the services that are running on our target machine and its operating system.
    الكل
    8 من الدقائق
    23 أبريل 2017
  • 19. Vulnerability Scanning with OpenVAS

    19. Vulnerability Scanning with OpenVAS

    Discovering vulnerabilities in our target system using the OpenVAS vulnerability scanner.
    Discovering vulnerabilities in our target system using the OpenVAS vulnerability scanner.
    الكل
    11 من الدقائق
    23 أبريل 2017
  • 20. Vulnerability Scanning with Nessus

    20. Vulnerability Scanning with Nessus

    Discover the services that are vulnerable on our target system using the Nessus scanner.
    Discover the services that are vulnerable on our target system using the Nessus scanner.
    الكل
    11 من الدقائق
    23 أبريل 2017
  • 21. Exploiting the Target System

    21. Exploiting the Target System

    Time to exploit the vulnerabilities found on our target system.
    Time to exploit the vulnerabilities found on our target system.
    الكل
    15 من الدقائق
    23 أبريل 2017
  • 22. Cracking the System Passwords

    22. Cracking the System Passwords

    We copied the system passwords from the target machine to our Kali Linux machine. Now it's time to crack those passwords.
    We copied the system passwords from the target machine to our Kali Linux machine. Now it's time to crack those passwords.
    الكل
    7 من الدقائق
    23 أبريل 2017
  • 23. Post Exploitation

    23. Post Exploitation

    Discussion about the post-exploitation phase.
    Discussion about the post-exploitation phase.
    الكل
    4 من الدقائق
    23 أبريل 2017
  • 24. Defensive CounterMeasures

    24. Defensive CounterMeasures

    What can a system administrator do against these hacking attacks?
    What can a system administrator do against these hacking attacks?
    الكل
    5 من الدقائق
    23 أبريل 2017
  • Learning Network Penetration Testing with Kali Linux
    2017موسم واحد
    Learn how to test your network against various types of attacks. We will teach viewers how to install Kali Linux, discuss about different phases of pen testing, etc. By the end of this section you will become familiar with the tools that Kali Linux offers to perform network penetration testing, how to exploit the vulnerable systems and how to patch them.
    المبدعون وفريق التمثيل
    فريق التمثيل
    Cristian Gradisteanu
    الاستديو
    Packt Publishing
    تقييمات
    3.5 out of 5 stars

    4 تصنيف عالمي

    1. 5 star
      22%
    2. 4 star
      55%
    3. 3 star
      0%
    4. 2 star
      0%
    5. 1 star
      23%
    قراءة كل التقييمات
    لغات الصوت
    English
    الترجمة
    English [CC]
    بالطلب أو بالمشاهدة، فأنت توافق على شروطنا. مُباع من قِبل Amazon.com Services LLC.

    الملاحظات