
24 episódios
1. The Course Overview

1. The Course Overview
This video provides an overview of the entire course.
2. Introducing Kali Linux

2. Introducing Kali Linux
This video aims to introduce you to Kali Linux.
3. Getting Familiar with Hardware Requirements and Recommendations

3. Getting Familiar with Hardware Requirements and Recommendations
This video discusses the required hardware and software that will allow us to install and run Kali Linux.
4. Installing Kali Linux in VirtualBox

4. Installing Kali Linux in VirtualBox
Installing Kali Linux in a virtual environment.
5. Installing Kali Linux on Raspberry Pi

5. Installing Kali Linux on Raspberry Pi
This video shows how to install Kali Linux on a Raspberry Pi device.
6. Introducing Kali Linux Interface and Tools

6. Introducing Kali Linux Interface and Tools
This video gives a brief introduction to the Kali Linux interface and tools.
7. Updating Kali Linux

7. Updating Kali Linux
Keeping Kali Linux up to date.
8. Networking Fundamentals

8. Networking Fundamentals
Some of the networking fundamentals and terms that we are going to use throughout this course.
9. Creating a Pen-Testing Lab Environment

9. Creating a Pen-Testing Lab Environment
Why is it important to have a pen-testing lab environment?
10. What Is Penetration Testing?

10. What Is Penetration Testing?
In this video, we will discuss what penetration testing is and why you might want to learn it.
11. Reconnaissance

11. Reconnaissance
This video represents a short introduction to the first phase of pen-testing-reconnaissance.
12. Getting Familiar with Vulnerability Scanning

12. Getting Familiar with Vulnerability Scanning
What is vulnerability scanning?
13. Gaining and Maintaining Access

13. Gaining and Maintaining Access
Third phase of pen-testing-gaining and maintaining access.
14. Covering Tracks

14. Covering Tracks
Last phase of a hacking attack-covering tracks.
15. Gathering Initial Information

15. Gathering Initial Information
Obtain passive information about our target.
16. Identifying Live Hosts

16. Identifying Live Hosts
It's time to perform some active reconnaissance.
17. Discovering Open Ports

17. Discovering Open Ports
Using Kali Linux tools, we try to discover the open ports available in our target machine.
18. Uncovering Services and Fingerprinting the OS

18. Uncovering Services and Fingerprinting the OS
Discover the services that are running on our target machine and its operating system.
19. Vulnerability Scanning with OpenVAS

19. Vulnerability Scanning with OpenVAS
Discovering vulnerabilities in our target system using the OpenVAS vulnerability scanner.
20. Vulnerability Scanning with Nessus

20. Vulnerability Scanning with Nessus
Discover the services that are vulnerable on our target system using the Nessus scanner.
21. Exploiting the Target System

21. Exploiting the Target System
Time to exploit the vulnerabilities found on our target system.
22. Cracking the System Passwords

22. Cracking the System Passwords
We copied the system passwords from the target machine to our Kali Linux machine. Now it's time to crack those passwords.
23. Post Exploitation

23. Post Exploitation
Discussion about the post-exploitation phase.
24. Defensive CounterMeasures

24. Defensive CounterMeasures
What can a system administrator do against these hacking attacks?
Learning Network Penetration Testing with Kali Linux
20171 temporada
Criadores e elenco
- Elenco
- Estúdio
Idiomas de áudio
Legendas
Ao fazer o pedido ou visualizar, você concorda com nossos Termos. Vendido pela Amazon.com Services LLC.












