
Learning Network Penetration Testing with Kali Linux
Available to buy
Episodes
S1 E1 - The Course Overview
April 23, 20174minThis video provides an overview of the entire course.Available to buyS1 E2 - Introducing Kali Linux
April 23, 20175minThis video aims to introduce you to Kali Linux.Available to buyS1 E3 - Getting Familiar with Hardware Requirements and Recommendations
April 23, 20174minThis video discusses the required hardware and software that will allow us to install and run Kali Linux.Available to buyS1 E4 - Installing Kali Linux in VirtualBox
April 23, 201714minInstalling Kali Linux in a virtual environment.Available to buyS1 E5 - Installing Kali Linux on Raspberry Pi
April 23, 201713minThis video shows how to install Kali Linux on a Raspberry Pi device.Available to buyS1 E6 - Introducing Kali Linux Interface and Tools
April 23, 20178minThis video gives a brief introduction to the Kali Linux interface and tools.Available to buyS1 E7 - Updating Kali Linux
April 23, 20176minKeeping Kali Linux up to date.Available to buyS1 E8 - Networking Fundamentals
April 23, 201713minSome of the networking fundamentals and terms that we are going to use throughout this course.Available to buyS1 E9 - Creating a Pen-Testing Lab Environment
April 23, 20179minWhy is it important to have a pen-testing lab environment?Available to buyS1 E10 - What Is Penetration Testing?
April 23, 20175minIn this video, we will discuss what penetration testing is and why you might want to learn it.Available to buyS1 E11 - Reconnaissance
April 23, 20178minThis video represents a short introduction to the first phase of pen-testing-reconnaissance.Available to buyS1 E12 - Getting Familiar with Vulnerability Scanning
April 23, 20173minWhat is vulnerability scanning?Available to buyS1 E13 - Gaining and Maintaining Access
April 23, 20174minThird phase of pen-testing-gaining and maintaining access.Available to buyS1 E14 - Covering Tracks
April 23, 20172minLast phase of a hacking attack-covering tracks.Available to buyS1 E15 - Gathering Initial Information
April 23, 20176minObtain passive information about our target.Available to buyS1 E16 - Identifying Live Hosts
April 23, 201711minIt's time to perform some active reconnaissance.Available to buyS1 E17 - Discovering Open Ports
April 23, 201710minUsing Kali Linux tools, we try to discover the open ports available in our target machine.Available to buyS1 E18 - Uncovering Services and Fingerprinting the OS
April 23, 20178minDiscover the services that are running on our target machine and its operating system.Available to buyS1 E19 - Vulnerability Scanning with OpenVAS
April 23, 201711minDiscovering vulnerabilities in our target system using the OpenVAS vulnerability scanner.Available to buyS1 E20 - Vulnerability Scanning with Nessus
April 23, 201711minDiscover the services that are vulnerable on our target system using the Nessus scanner.Available to buyS1 E21 - Exploiting the Target System
April 23, 201715minTime to exploit the vulnerabilities found on our target system.Available to buyS1 E22 - Cracking the System Passwords
April 23, 20177minWe copied the system passwords from the target machine to our Kali Linux machine. Now it's time to crack those passwords.Available to buyS1 E23 - Post Exploitation
April 23, 20174minDiscussion about the post-exploitation phase.Available to buyS1 E24 - Defensive CounterMeasures
April 23, 20175minWhat can a system administrator do against these hacking attacks?Available to buy