
Learning Network Penetration Testing with Kali Linux
Disponibile per l’acquisto
Episodi
S1 E1 - The Course Overview
23 aprile 20174minThis video provides an overview of the entire course.Disponibile per l’acquistoS1 E2 - Introducing Kali Linux
23 aprile 20175minThis video aims to introduce you to Kali Linux.Disponibile per l’acquistoS1 E3 - Getting Familiar with Hardware Requirements and Recommendations
23 aprile 20174minThis video discusses the required hardware and software that will allow us to install and run Kali Linux.Disponibile per l’acquistoS1 E4 - Installing Kali Linux in VirtualBox
23 aprile 201714minInstalling Kali Linux in a virtual environment.Disponibile per l’acquistoS1 E5 - Installing Kali Linux on Raspberry Pi
23 aprile 201713minThis video shows how to install Kali Linux on a Raspberry Pi device.Disponibile per l’acquistoS1 E6 - Introducing Kali Linux Interface and Tools
23 aprile 20178minThis video gives a brief introduction to the Kali Linux interface and tools.Disponibile per l’acquistoS1 E7 - Updating Kali Linux
23 aprile 20176minKeeping Kali Linux up to date.Disponibile per l’acquistoS1 E8 - Networking Fundamentals
23 aprile 201713minSome of the networking fundamentals and terms that we are going to use throughout this course.Disponibile per l’acquistoS1 E9 - Creating a Pen-Testing Lab Environment
23 aprile 20179minWhy is it important to have a pen-testing lab environment?Disponibile per l’acquistoS1 E10 - What Is Penetration Testing?
23 aprile 20175minIn this video, we will discuss what penetration testing is and why you might want to learn it.Disponibile per l’acquistoS1 E11 - Reconnaissance
23 aprile 20178minThis video represents a short introduction to the first phase of pen-testing-reconnaissance.Disponibile per l’acquistoS1 E12 - Getting Familiar with Vulnerability Scanning
23 aprile 20173minWhat is vulnerability scanning?Disponibile per l’acquistoS1 E13 - Gaining and Maintaining Access
23 aprile 20174minThird phase of pen-testing-gaining and maintaining access.Disponibile per l’acquistoS1 E14 - Covering Tracks
23 aprile 20172minLast phase of a hacking attack-covering tracks.Disponibile per l’acquistoS1 E15 - Gathering Initial Information
23 aprile 20176minObtain passive information about our target.Disponibile per l’acquistoS1 E16 - Identifying Live Hosts
23 aprile 201711minIt's time to perform some active reconnaissance.Disponibile per l’acquistoS1 E17 - Discovering Open Ports
23 aprile 201710minUsing Kali Linux tools, we try to discover the open ports available in our target machine.Disponibile per l’acquistoS1 E18 - Uncovering Services and Fingerprinting the OS
23 aprile 20178minDiscover the services that are running on our target machine and its operating system.Disponibile per l’acquistoS1 E19 - Vulnerability Scanning with OpenVAS
23 aprile 201711minDiscovering vulnerabilities in our target system using the OpenVAS vulnerability scanner.Disponibile per l’acquistoS1 E20 - Vulnerability Scanning with Nessus
23 aprile 201711minDiscover the services that are vulnerable on our target system using the Nessus scanner.Disponibile per l’acquistoS1 E21 - Exploiting the Target System
23 aprile 201715minTime to exploit the vulnerabilities found on our target system.Disponibile per l’acquistoS1 E22 - Cracking the System Passwords
23 aprile 20177minWe copied the system passwords from the target machine to our Kali Linux machine. Now it's time to crack those passwords.Disponibile per l’acquistoS1 E23 - Post Exploitation
23 aprile 20174minDiscussion about the post-exploitation phase.Disponibile per l’acquistoS1 E24 - Defensive CounterMeasures
23 aprile 20175minWhat can a system administrator do against these hacking attacks?Disponibile per l’acquisto