Learning Network Penetration Testing with Kali Linux

Learning Network Penetration Testing with Kali Linux

Stagione 1
Learn how to test your network against various types of attacks. We will teach viewers how to install Kali Linux, discuss about different phases of pen testing, etc. By the end of this section you will become familiar with the tools that Kali Linux offers to perform network penetration testing, how to exploit the vulnerable systems and how to patch them.
201724 episodiTUTTI
Disponibile per l’acquisto

Episodi

  1. S1 E1 - The Course Overview

    23 aprile 2017
    4min
    TUTTI
    This video provides an overview of the entire course.
    Disponibile per l’acquisto
  2. S1 E2 - Introducing Kali Linux

    23 aprile 2017
    5min
    TUTTI
    This video aims to introduce you to Kali Linux.
    Disponibile per l’acquisto
  3. S1 E3 - Getting Familiar with Hardware Requirements and Recommendations

    23 aprile 2017
    4min
    TUTTI
    This video discusses the required hardware and software that will allow us to install and run Kali Linux.
    Disponibile per l’acquisto
  4. S1 E4 - Installing Kali Linux in VirtualBox

    23 aprile 2017
    14min
    TUTTI
    Installing Kali Linux in a virtual environment.
    Disponibile per l’acquisto
  5. S1 E5 - Installing Kali Linux on Raspberry Pi

    23 aprile 2017
    13min
    TUTTI
    This video shows how to install Kali Linux on a Raspberry Pi device.
    Disponibile per l’acquisto
  6. S1 E6 - Introducing Kali Linux Interface and Tools

    23 aprile 2017
    8min
    TUTTI
    This video gives a brief introduction to the Kali Linux interface and tools.
    Disponibile per l’acquisto
  7. S1 E7 - Updating Kali Linux

    23 aprile 2017
    6min
    TUTTI
    Keeping Kali Linux up to date.
    Disponibile per l’acquisto
  8. S1 E8 - Networking Fundamentals

    23 aprile 2017
    13min
    TUTTI
    Some of the networking fundamentals and terms that we are going to use throughout this course.
    Disponibile per l’acquisto
  9. S1 E9 - Creating a Pen-Testing Lab Environment

    23 aprile 2017
    9min
    TUTTI
    Why is it important to have a pen-testing lab environment?
    Disponibile per l’acquisto
  10. S1 E10 - What Is Penetration Testing?

    23 aprile 2017
    5min
    TUTTI
    In this video, we will discuss what penetration testing is and why you might want to learn it.
    Disponibile per l’acquisto
  11. S1 E11 - Reconnaissance

    23 aprile 2017
    8min
    TUTTI
    This video represents a short introduction to the first phase of pen-testing-reconnaissance.
    Disponibile per l’acquisto
  12. S1 E12 - Getting Familiar with Vulnerability Scanning

    23 aprile 2017
    3min
    TUTTI
    What is vulnerability scanning?
    Disponibile per l’acquisto
  13. S1 E13 - Gaining and Maintaining Access

    23 aprile 2017
    4min
    TUTTI
    Third phase of pen-testing-gaining and maintaining access.
    Disponibile per l’acquisto
  14. S1 E14 - Covering Tracks

    23 aprile 2017
    2min
    TUTTI
    Last phase of a hacking attack-covering tracks.
    Disponibile per l’acquisto
  15. S1 E15 - Gathering Initial Information

    23 aprile 2017
    6min
    TUTTI
    Obtain passive information about our target.
    Disponibile per l’acquisto
  16. S1 E16 - Identifying Live Hosts

    23 aprile 2017
    11min
    TUTTI
    It's time to perform some active reconnaissance.
    Disponibile per l’acquisto
  17. S1 E17 - Discovering Open Ports

    23 aprile 2017
    10min
    TUTTI
    Using Kali Linux tools, we try to discover the open ports available in our target machine.
    Disponibile per l’acquisto
  18. S1 E18 - Uncovering Services and Fingerprinting the OS

    23 aprile 2017
    8min
    TUTTI
    Discover the services that are running on our target machine and its operating system.
    Disponibile per l’acquisto
  19. S1 E19 - Vulnerability Scanning with OpenVAS

    23 aprile 2017
    11min
    TUTTI
    Discovering vulnerabilities in our target system using the OpenVAS vulnerability scanner.
    Disponibile per l’acquisto
  20. S1 E20 - Vulnerability Scanning with Nessus

    23 aprile 2017
    11min
    TUTTI
    Discover the services that are vulnerable on our target system using the Nessus scanner.
    Disponibile per l’acquisto
  21. S1 E21 - Exploiting the Target System

    23 aprile 2017
    15min
    TUTTI
    Time to exploit the vulnerabilities found on our target system.
    Disponibile per l’acquisto
  22. S1 E22 - Cracking the System Passwords

    23 aprile 2017
    7min
    TUTTI
    We copied the system passwords from the target machine to our Kali Linux machine. Now it's time to crack those passwords.
    Disponibile per l’acquisto
  23. S1 E23 - Post Exploitation

    23 aprile 2017
    4min
    TUTTI
    Discussion about the post-exploitation phase.
    Disponibile per l’acquisto
  24. S1 E24 - Defensive CounterMeasures

    23 aprile 2017
    5min
    TUTTI
    What can a system administrator do against these hacking attacks?
    Disponibile per l’acquisto