HOME > IT & Software > Penetration Testing with KALI and More- All You Need to Know

Penetration Testing with KALI and More- All You Need to Know

SynopsisPenetration Testing with KALI and More: All You Need to Know,...
Penetration Testing with KALI and More- All You Need to Know  No.1

Penetration Testing with KALI and More: All You Need to Know, available at $59.99, has an average rating of 4.4, with 85 lectures, based on 981 reviews, and has 44693 subscribers.

You will learn about Learn simplified ethical hacking techniques from scratch Perform an actual Mobile attack Master 2 smart techniques to crack into wireless networks Learn more than 9 ways to perform LAN attacks Learn Linux basics Learn 10+ web application attacks Learn more than 5 proven methods of Social Engineering attacks Obtain 20+ skills any penetration tester needs to succeed Make better decisions on how to protect your applications and network Upgrade your information security skills for a new job or career change Learn how to write a professional penetration testing report Course is constantly being updated, so the knowledge you will acquire will always be applicable This course is ideal for individuals who are Anyone who wants to learn how to secure their systems from hacker or Anyone who wants to learn how hackers can attack their computer systems or Anyone looking to become a penetration tester (From zero to hero) or Computer Science, Computer Security, and Computer Engineering Students It is particularly useful for Anyone who wants to learn how to secure their systems from hacker or Anyone who wants to learn how hackers can attack their computer systems or Anyone looking to become a penetration tester (From zero to hero) or Computer Science, Computer Security, and Computer Engineering Students.

Enroll now: Penetration Testing with KALI and More: All You Need to Know

Summary

Title: Penetration Testing with KALI and More: All You Need to Know

Price: $59.99

Average Rating: 4.4

Number of Lectures: 85

Number of Published Lectures: 84

Number of Curriculum Items: 85

Number of Published Curriculum Objects: 84

Original Price: $19.99

Quality Status: approved

Status: Live

What You Will Learn

  • Learn simplified ethical hacking techniques from scratch
  • Perform an actual Mobile attack
  • Master 2 smart techniques to crack into wireless networks
  • Learn more than 9 ways to perform LAN attacks
  • Learn Linux basics
  • Learn 10+ web application attacks
  • Learn more than 5 proven methods of Social Engineering attacks
  • Obtain 20+ skills any penetration tester needs to succeed
  • Make better decisions on how to protect your applications and network
  • Upgrade your information security skills for a new job or career change
  • Learn how to write a professional penetration testing report
  • Course is constantly being updated, so the knowledge you will acquire will always be applicable
  • Who Should Attend

  • Anyone who wants to learn how to secure their systems from hacker
  • Anyone who wants to learn how hackers can attack their computer systems
  • Anyone looking to become a penetration tester (From zero to hero)
  • Computer Science, Computer Security, and Computer Engineering Students
  • Target Audiences

  • Anyone who wants to learn how to secure their systems from hacker
  • Anyone who wants to learn how hackers can attack their computer systems
  • Anyone looking to become a penetration tester (From zero to hero)
  • Computer Science, Computer Security, and Computer Engineering Students
  • Welcome to this comprehensive course on penetration testing with KALI. The course examines the various penetration testing concepts and techniquesemployed in a modern ubiquitous computing world, and will take you from a beginner to a more advanced level. We will discuss various topics ranging from traditional to many modern ones, such as Networkingsecurity, Linuxsecurity, Web Applicationsstructure and security, Mobile Applicationsarchitecture and security, Hardwaresecurity, and the hot topic of IoTsecurity. At the end of the course, I will show you some real attacks. Course is constantly being updated, so the knowledge you will acquire will always be applicable.

    The layout of the course is easy to walk-through, and the videos are made shortand engaging. My purpose is to present you with case exposition and show you live demos, while utilizing a large set of KALI tools (Enumeration, Scanning, Exploitation, Persistence Access, Reporting and Social Engineering tools) in order to get you started quickly. The necessary resources and tools are posted for each sections of the course.

    Before jumping into penetration testing, you will first learn how to set up your own lab and install the needed software to practice Penetration Testing along with me. All the attacks explained in this course are launched against real devices, and nothing is theoretical. The course will demonstrate how to fully control victims’ devices such as servers, workstations, and mobile phones. The course can also be interesting to those looking for quick hacks such as controlling victim’s camera, screen, mobile contacts, emails and SMS messages.

    At the end of the course you will be equipped with the necessary tools and skills to:

    1) Assess security risks by adopting a standard Threat Modeling technique

    2) Adopt a structured approach to perform Penetration Tests

    3) Protect yourself and the organization you work at

    4) Compile security findings and present them professionally to your clients

    5) Make the world a safer place

    You can as well enjoy the JUICY BONUS section at the end of the course, which shows you how to setup useful portable Pentest Hardware Tools that you can employ in your attacks.

    I have put my 14 years of experience into this course by trying to answer many of the questions I had during my journey of learning. I have as well took the feedback and input of many of my students, peers, and professional figures.

    I will be happy to answer all your inquiries and connect with you.

    Join TODAY and enjoy a life-time access.

    PS: The course is available in Arabic as well as Russian versions.

    Hack Ethically  !

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: The Undeniable Power of Ethical Hacking

    Chapter 2: Setup Your Lab

    Lecture 1: Why KALI

    Lecture 2: Different Installation Methods

    Lecture 3: Install KALI

    Lecture 4: Color Coding for Root User

    Lecture 5: Install Windows (Victims Machine)

    Chapter 3: Explore KALI

    Lecture 1: Master KALI Desktop Environment

    Lecture 2: Color Coding

    Chapter 4: Setup Your KALI Server

    Lecture 1: Get Started with Linux Commands

    Lecture 2: Explore Main Services and Programs

    Chapter 5: Steps to Plan a Successful Penetration Test

    Lecture 1: Penetration Testing Cycle

    Lecture 2: Threat Modeling

    Chapter 6: 9+ Ways to Attack a Network

    Lecture 1: Wireshark Simplified

    Lecture 2: How Does Port Scanning Work

    Lecture 3: Introducing NMAP

    Lecture 4: Understand NETBIOS and SMB Attacks

    Lecture 5: NMAP and ZENMAP Simplified

    Lecture 6: Execute Man-in-the-Middle Attacks

    Lecture 7: Perform a DNS Spoofing Attack

    Lecture 8: Identify a DNS Zone Transfer Vulnerability

    Lecture 9: Plan DOS and DDOS Attacks

    Lecture 10: All-in-one Metasploit Framework

    Lecture 11: Transfer the Payload to a Windows Machine

    Lecture 12: Create Your First Trojan and Infiltrate a Target

    Lecture 13: Explore The Powerful Armitage Tool

    Lecture 14: Hide a Payload in a JPEG Image

    Chapter 7: Attack Modern Wireless Networks

    Lecture 1: Introduction

    Lecture 2: WEP Cracking

    Lecture 3: WPA and WPA2 Cracking

    Lecture 4: WPS Cracking

    Lecture 5: Tips to Improve Your Wireless Network Security

    Chapter 8: 4+ Ways to Attack a Web Application

    Lecture 1: Web Applications Security Overview

    Lecture 2: Web Applications Attack Surface

    Lecture 3: Metasploitable VM

    Lecture 4: Injection Vulnerabilities

    Lecture 5: Broken Authentication Vulnerabilities

    Lecture 6: Sensitive Data Exposure Vulnerabilities

    Lecture 7: XML External Entities (XXE) Vulnerabilities

    Lecture 8: Broken Access Control Vulnerabilities

    Lecture 9: Security Misconfiguration Vulnerabilities

    Lecture 10: Cross-Site Scripting (XSS) Vulnerabilities

    Lecture 11: Insecure Deserialization Vulnerabilities

    Lecture 12: Using Components with Known Vulnerabilities

    Lecture 13: Insufficient Logging & Monitoring Vulnerabilities

    Lecture 14: Additional Risks to Consider

    Lecture 15: Discover Vulnerabilities in Websites

    Lecture 16: Control Database Server with SQLMap

    Lecture 17: Easily Hack a WordPress Site

    Lecture 18: Intercept, Analyze, and Replay Web Traffic

    Chapter 9: Simple Ways to Gain Access

    Lecture 1: Various Password Attacks

    Lecture 2: Hashing in a Nutshell

    Lecture 3: Execute an Offline Password Attack on Linux

    Lecture 4: Execute an Offline Password Attack on Windows

    Lecture 5: Run an Online Password Attack on Linux

    Lecture 6: Run an Online Password Attack on a Router

    Lecture 7: Crack Passwords with Rainbow Tables

    Lecture 8: Design Effective Wordlists

    Lecture 9: Password Management Tips

    Chapter 10: Proven Social Engineering Techniques

    Lecture 1: Attack Vectors

    Lecture 2: Open-source Intelligence (OSINT)

    Lecture 3: Google Dorks Live Examples

    Lecture 4: Track and Spoof Emails Easily

    Lecture 5: Collect and Visualize Data with Maltego

    Lecture 6: Execute a Phishing Attack

    Lecture 7: Hack Facebook, Twitter, and Gmail Accounts

    Chapter 11: Attack Mobile Phones

    Lecture 1: Mobile Attack Surface

    Lecture 2: Decrypt SSL Session

    Lecture 3: Reverse Engineer an Android Application

    Lecture 4: Hack an Android Phone and Download its Contacts

    Chapter 12: Maintain Access

    Lecture 1: Post-Exploitation Terminologies

    Lecture 2: Backdoor Tools Explained

    Lecture 3: Netcat Simplified

    Lecture 4: Install a Backdoor

    Lecture 5: Deface a Website in Few Seconds

    Lecture 6: Create a Simple Ransomware

    Lecture 7: Understand Hidden Tear Ransomware

    Lecture 8: Bypass Firewalls by Tunneling Data and Commands over DNS

    Chapter 13: Let’s Get Real

    Lecture 1: Publish Your Weapons Online

    Lecture 2: Stay Anonymous Online

    Lecture 3: Setup a Stealthy Command and Control Center Online

    Chapter 14: How to Prepare and Present Your Report

    Lecture 1: Report Writing Techniques

    Lecture 2: How Can Pentest.ws Help You

    Chapter 15: Secret Sauce BONUS

    Lecture 1: Create a WiFi Jammer

    Lecture 2: Create a $3 Rubber Ducky Key-logger

    Instructors

  • Penetration Testing with KALI and More- All You Need to Know  No.2
    Mohamad Mahjoub
    Cyber Security Expert
  • Rating Distribution

  • 1 stars: 15 votes
  • 2 stars: 18 votes
  • 3 stars: 139 votes
  • 4 stars: 347 votes
  • 5 stars: 462 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!