Metasploit: Ethical hacking and Penetration testing on Kali

4.5 (12)
Онлайн-курс
Payment
Обучение платное
Language
Not set
Duration
4.5 часа курса
Курс от Udemy
Чему вы научились?
You will learn Metasploit framework
You will understand all the steps to perform any hacking attack
You will get some skills to work with Linux
You will dive into anatomy of different attacks and understand how to perform them on real systems
You will get some skills of WIndows administration
You will see how to collect information about your target
You will see how different scanning techniques work
You will understand how to protect your system
О курсе

This course will teach you hacker's mindset. You will see all the steps which must be performed for successful attack using Metasploit on Kali. If you want to know how security mechanisms of Windows and Linux work and you want to know how to bypass them this course is definitly for you.

All the lessons are well structured and contain actual infromation. That means that all techniques represented in the course still work on modern system.

I am going to keep the content updated and also on the regular basis am going to add new lessons and assignments for my students.

Given course is intended was everyone who is interested in Ethical hacking and Cyber security. It will be useful and helpful for beginners and professionals. Beginners will understand hot to orient in learning Information security and it will help them to structure their studying process.

What will you learn?

After completing the course you will get the following skills and knowledge:

· Skills to manage Windows and Linux using console commands

· All the steps of hacking remote system

· Different port and vulnerability scanning methods of network devices

· You will learn how to attack Windows and Linux systems using different methods

· You will understand how to protect your system against different attacks

Course structure:

· Lab preparation. We will install different Windows and Linux systems.

· Metasploit framework introduction. In given section you will understand how to work with Metasploit, how to perform network attacks, how to collect information about your victim.

· Information gathering. Before attacking remote system it is vital to collect as more information as possible about your target. In this section you will get some techniques.

· Scanning. Here we will discuss how to get more information about running services on remote systems and possible vulnerabilities in Operating system and applications.

· Access gaining. In this section I explain different techniques to get access to remote system. All described techniques still work on real system.

· Access maintaining and Post exploitation. Here you will understand how escalate your privileges on the hacked system, how to hack passwords, how to install backdoors for further remote management and many other things

Требования
  • The basic knowledge of TCP/IP is desired
  • All other skills you will get during the course
  • You will also need a laptop/PC with enabled virtualization options
Лекторы
Visadi Khalikov
Visadi Khalikov
Network Security engineer and Penetration tester
Платформа
/storage/img/providers/udemy.svg
Курсы Udemy подойдут для профессионального развития. Платформа устроена таким образом, что эксперты сами запускают курсы. Все материалы передаются в пожизненный доступ. На этой платформе можно найти курс, без преувеличений, на любую тему – начиная от тьюториала по какой-то камере и заканчивая теоретическим курсом по управлению финансовыми рисками. Язык и формат обучения устанавливается преподавателем, поэтому стоит внимательно изучить информацию о курсе перед покупкой.
Рейтинг
4.5
(8)
(2)
(2)
(0)
(0)
Комментарии (12)
Как и любой другой веб-сайт, konevy использует файлы cookie. Эти файлы используются для хранения информации, включая предпочтения посетителей и страницы веб-сайта, которые он/она посещал. Информация используется для того, чтобы подстроить содержимое нашей страницы под тип браузера пользователя и другие параметры и таким образом улучшить его пользовательский опыт. Для получения более подробной информации о файлах cookie, пожалуйста, прочтите статью «Что такое файлы cookie»