Practical Guide to Penetration Testing with Kali Linux

4.6 (11)
Онлайн-курс
Payment
Обучение платное
Language
Not set
Duration
12 часов курса
Курс от Udemy
Чему вы научились?
Set up your environment for performing penetration testing using Kali Linux.
Perform penetration testing on your websites. Master most recent hacker tools and techniques.
Perform deauthentication attacks on Wi-Fi routers. Use GPU power for hacking WPA2 Wi-Fi routers.
Take a detailed walk-through of Burp Suite and understand a few Burp tools
Get familiar with the post-exploitation attacks on Windows and Linux to maintain access to a target
Explore a vast variety of stealth techniques to bypass a number of protections when penetration testing
Create easy-to-follow reports with precise information and detailed findings
Learn Various Information Gathering tools techniques. Perform Network and Web Vulnerability Analysis.
Perform Password Cracking Techniques. Wifi hacking to learn wireless penetration techniques.
Learn MITM and Social Engineering Attack. Perform Exploitation and Post Exploitation Attack.
О курсе

Are you a System Administrator, Penetration tester, or Network engineer looking to take your penetration testing skills to the next level? Then this course is for you! It is your one-stop solution to safeguarding complex network devices and modern operating systems from external threats using Kali Linux.

Kali Linux is rated as the #1 security operating system. In view of all this, companies are hiring ethical hackers just like you to perform network and website vulnerability testing to help prevent hackers from getting in. With the Linux operating system and its core structure based on Debian, it comes jam-packed with all the tools you need to penetration-test your websites and infrastructures.

This comprehensive 3-in-1 course follows a step-by-step practical approach to discover the secrets of Pentesting using Kali Linux and gain access to a system using a portfolio of different techniques. To begin with, you’ll create a persistent reverse shell to perform penetration testing on your websites. You’ll also perform de-authentication attacks on Wi-Fi routers. You’ll get familiar with the post-exploitation attacks on Windows and Linux to maintain access to a target. Finally, you’ll not only perform server-side and client-side attacks but also master major Kali Linux tools and techniques.

Towards the end of this course, you'll not only discover the secrets of Pentesting using Kali Linux but also gain access to a system using a portfolio of different techniques!

Contents and Overview

This training program includes 3 complete courses, carefully chosen to give you the most comprehensive training possible.

The first course, Hands-On Infrastructure Penetration Testing, covers how to defend your systems from methodical and proficient attackers. This course will provide you with advanced penetration testing techniques with Kali Linux that will help you exploit databases and web/application servers and perform network penetration. With this course, you will prevent your system from being exploited by using techniques such as reverse shells. Moving on, this course will not only walk you through managing vulnerabilities but will also show you how to protect endpoints. You will explore web pentesting, learn how to set up your LAB environment, and explore the various vulnerabilities that exist nowadays. Towards the end of this course, you will also perform wireless penetration testing to defend against the wireless assets. Finally, you will have mastered the skills and methodologies you need to breach infrastructures and provide complete endpoint protection for your system via Kali Linux.

The second course, Practical Web App Pentesting with Kali Linux, covers discovering the secrets of Pentesting using Kali Linux. You will learn how to test your network against various types of attack and develop a network-testing environment that can be used to test scanning tools and techniques. Employ methods effectively used by real hackers to ensure the most effective penetration testing of your network; select and configure the most effective tools from Kali Linux to test network security; employ stealth to avoid detection in the network being tested, and recognize when stealthy attacks are being used against your network. Exploit networks and data systems using wired and wireless networks as well as web services. Identify and download valuable data from target systems and learn to maintain access to compromised systems. Use social engineering to compromise the weakest part of the network—the end users. Use port scanning for UDP scanning, stealth scanning, and connect/zombie scanning using pen testing tools. You will learn how to utilize the arsenal of tools available in Kali Linux to conquer any network environment. By the end of this course, you will be a pro with the Kali Linux tools you need to perform advanced penetration testing; you will know how to exploit vulnerable systems and how to patch them.

The third course, End-to-End Penetration Testing with Kali Linux, covers performing vulnerability assessment and penetration testing. You will learn how to test your network against various types of attack and develop a network-testing environment that can be used to test scanning tools and techniques. Employ methods effectively used by real hackers to ensure the most effective penetration testing of your network; select and configure the most effective tools from Kali Linux to test network security; employ stealth to avoid detection in the network being tested, and recognize when stealthy attacks are being used against your network. Exploit networks and data systems using wired and wireless networks as well as web services. Identify and download valuable data from target systems and learn to maintain access to compromised systems. Use social engineering to compromise the weakest part of the network—the end users. Use port scanning for UDP scanning, stealth scanning, and connect/zombie scanning using pentesting tools. You will learn how to utilize the arsenal of tools available in Kali Linux to conquer any network environment. By the end of this course, you will be a pro with the Kali Linux tools you need to perform advanced penetration testing; you will know how to exploit vulnerable systems and how to patch them.

Towards the end of this course, you'll discover the secrets of Pentesting using Kali Linux and gain access to a system using a portfolio of different techniques.

About the Authors

  • Parvinder Yadav has worked with wireless penetration testing for more than 4 years and has a deep knowledge of networking. He has created a lot of projects such as a Wi-Fi jammer using shell scripting and the Raspberry Pi 2; a portable hacking device which just weighs 100 grams and can hack almost any Wi-Fi router; a portable wireless CCTV camera (using the Raspberry Pi) that is the same size as a mobile; a portable media server; a radio station using the Raspberry Pi; and a lot more. He is the author of PNPtutorials, he is a geeky YouTuber and a Tech-Freak, and has more than 55K subscribers to his channel on YouTube.
  • Paul Olushile graduated with a diploma degree in computer science and is currently working as a Cyber Security Expert. He loves teaching and hence he is freelancing to share his expertise with the students for over 4 years now as a Unix/Linux Administrator. He has a diverse set of certifications, interests, and experiences including server administration.
  • Sunil Gupta is a certified ethical hacker. Currently, he teaches 45,000+ students online in 150+ countries. He is a specialist in ethical hacking and cybersecurity. His strengths lie in vulnerability assessment, penetration testing, intrusion detection, risk identification, data analysis, reporting, and briefing.
Требования
  • Some prior exposure to the basics of Kali Linux and Windows command-line syntax is assumed.
  • Prior hands-on experience with penetration testing/ethical hacking will be beneficial but not necessary.
Лекторы
Packt Publishing
Packt Publishing
Tech Knowledge in Motion
Платформа
/storage/img/providers/udemy.svg
Курсы Udemy подойдут для профессионального развития. Платформа устроена таким образом, что эксперты сами запускают курсы. Все материалы передаются в пожизненный доступ. На этой платформе можно найти курс, без преувеличений, на любую тему – начиная от тьюториала по какой-то камере и заканчивая теоретическим курсом по управлению финансовыми рисками. Язык и формат обучения устанавливается преподавателем, поэтому стоит внимательно изучить информацию о курсе перед покупкой.
Рейтинг
4.6
(6)
(4)
(0)
(1)
(0)
Комментарии (11)
Как и любой другой веб-сайт, konevy использует файлы cookie. Эти файлы используются для хранения информации, включая предпочтения посетителей и страницы веб-сайта, которые он/она посещал. Информация используется для того, чтобы подстроить содержимое нашей страницы под тип браузера пользователя и другие параметры и таким образом улучшить его пользовательский опыт. Для получения более подробной информации о файлах cookie, пожалуйста, прочтите статью «Что такое файлы cookie»