Learning Network Penetration Testing with Kali Linux

Learning Network Penetration Testing with Kali Linux

Season 1
Learn how to test your network against various types of attacks. We will teach viewers how to install Kali Linux, discuss about different phases of pen testing, etc. By the end of this section you will become familiar with the tools that Kali Linux offers to perform network penetration testing, how to exploit the vulnerable systems and how to patch them.
201724 episodesALL
Available to buy

Episodes

  1. S1 E1 - The Course Overview

    April 23, 2017
    4min
    ALL
    This video provides an overview of the entire course.
    Available to buy
  2. S1 E2 - Introducing Kali Linux

    April 23, 2017
    5min
    ALL
    This video aims to introduce you to Kali Linux.
    Available to buy
  3. S1 E3 - Getting Familiar with Hardware Requirements and Recommendations

    April 23, 2017
    4min
    ALL
    This video discusses the required hardware and software that will allow us to install and run Kali Linux.
    Available to buy
  4. S1 E4 - Installing Kali Linux in VirtualBox

    April 23, 2017
    14min
    ALL
    Installing Kali Linux in a virtual environment.
    Available to buy
  5. S1 E5 - Installing Kali Linux on Raspberry Pi

    April 23, 2017
    13min
    ALL
    This video shows how to install Kali Linux on a Raspberry Pi device.
    Available to buy
  6. S1 E6 - Introducing Kali Linux Interface and Tools

    April 23, 2017
    8min
    ALL
    This video gives a brief introduction to the Kali Linux interface and tools.
    Available to buy
  7. S1 E7 - Updating Kali Linux

    April 23, 2017
    6min
    ALL
    Keeping Kali Linux up to date.
    Available to buy
  8. S1 E8 - Networking Fundamentals

    April 23, 2017
    13min
    ALL
    Some of the networking fundamentals and terms that we are going to use throughout this course.
    Available to buy
  9. S1 E9 - Creating a Pen-Testing Lab Environment

    April 23, 2017
    9min
    ALL
    Why is it important to have a pen-testing lab environment?
    Available to buy
  10. S1 E10 - What Is Penetration Testing?

    April 23, 2017
    5min
    ALL
    In this video, we will discuss what penetration testing is and why you might want to learn it.
    Available to buy
  11. S1 E11 - Reconnaissance

    April 23, 2017
    8min
    ALL
    This video represents a short introduction to the first phase of pen-testing-reconnaissance.
    Available to buy
  12. S1 E12 - Getting Familiar with Vulnerability Scanning

    April 23, 2017
    3min
    ALL
    What is vulnerability scanning?
    Available to buy
  13. S1 E13 - Gaining and Maintaining Access

    April 23, 2017
    4min
    ALL
    Third phase of pen-testing-gaining and maintaining access.
    Available to buy
  14. S1 E14 - Covering Tracks

    April 23, 2017
    2min
    ALL
    Last phase of a hacking attack-covering tracks.
    Available to buy
  15. S1 E15 - Gathering Initial Information

    April 23, 2017
    6min
    ALL
    Obtain passive information about our target.
    Available to buy
  16. S1 E16 - Identifying Live Hosts

    April 23, 2017
    11min
    ALL
    It's time to perform some active reconnaissance.
    Available to buy
  17. S1 E17 - Discovering Open Ports

    April 23, 2017
    10min
    ALL
    Using Kali Linux tools, we try to discover the open ports available in our target machine.
    Available to buy
  18. S1 E18 - Uncovering Services and Fingerprinting the OS

    April 23, 2017
    8min
    ALL
    Discover the services that are running on our target machine and its operating system.
    Available to buy
  19. S1 E19 - Vulnerability Scanning with OpenVAS

    April 23, 2017
    11min
    ALL
    Discovering vulnerabilities in our target system using the OpenVAS vulnerability scanner.
    Available to buy
  20. S1 E20 - Vulnerability Scanning with Nessus

    April 23, 2017
    11min
    ALL
    Discover the services that are vulnerable on our target system using the Nessus scanner.
    Available to buy
  21. S1 E21 - Exploiting the Target System

    April 23, 2017
    15min
    ALL
    Time to exploit the vulnerabilities found on our target system.
    Available to buy
  22. S1 E22 - Cracking the System Passwords

    April 23, 2017
    7min
    ALL
    We copied the system passwords from the target machine to our Kali Linux machine. Now it's time to crack those passwords.
    Available to buy
  23. S1 E23 - Post Exploitation

    April 23, 2017
    4min
    ALL
    Discussion about the post-exploitation phase.
    Available to buy
  24. S1 E24 - Defensive CounterMeasures

    April 23, 2017
    5min
    ALL
    What can a system administrator do against these hacking attacks?
    Available to buy