Penetration Testing and Ethical Hacking with Kali Linux

Pluralsight
Course Summary
Learn how to conduct a practical penetration test using Kali Linux.
-
+
Course Description
This course introduces ethical hackers and penetration testers to Kali Linux. This course will show IT professionals how to use the ethical hacking techniques and how to conduct a professional penetration test workflow using the Swiss Army Knife operating system Kali Linux.
-
+
Course Syllabus
Installing and Configuring Kali Linux- 40m 34s
—Introduction 0m 37s
—Kali Linux 2.0 7m 15s
—Creating a Virtual Machine 7m 36s
—Installing Kali Linux 8m 13s
—Updating Kali Linux 5m 46s
—Installing Additional Tools on Kali 4m 12s
—Configuring SSH 1m 27s
—Being Anonymous with Tor 3m 50s
—Scan Your System for Rootkits 0m 52s
—Summary 0m 41sPre-penetration Testing Checklist- 12m 28s
—Introduction 0m 46s
—Pre-penetration Checklist 9m 17s
—Course Workflow 1m 51s
—Summary 0m 34sInformation Gathering- 44m 42sExternal Pen-testing- 17m 8sWebsite Penetration Testing- 1h 0mInternal Network Penetration Testing- 16m 19sNetwork Sniffing- 39m 3sExploitation- 43m 56sSocial Engineering- 21m 43sWi-Fi Penetration Testing- 29m 45sBrute Force Attack Testing- 15m 16sAdvanced Penetration Testing- 21m 33s
This course is listed under
Open Source
, Development & Implementations
, Networks & IT Infrastructure
, Operating Systems
, IT Security & Architecture
and Quality Assurance & Testing
Community
Related Posts: