Kali Linux, Ethical Hacking and Pen Testing for Beginners
4.0 (109 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
9,340 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Kali Linux, Ethical Hacking and Pen Testing for Beginners to your Wishlist.

Add to Wishlist

Kali Linux, Ethical Hacking and Pen Testing for Beginners

Learn what it takes to become an Ethical Hacker. Discover the world of Ethical Hacking and Penetration Testing.
4.0 (109 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
9,340 students enrolled
Last updated 10/2016
English
English [Auto-generated]
Current price: $10 Original price: $95 Discount: 89% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 4.5 hours on-demand video
  • 1 Article
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Know what an ethical hacker is and what they do in their Jobs
  • Common information security terms
  • How to install Kali Linux using VMWare
View Curriculum
Requirements
  • How to install a VM is recommended but not required
Description

At the beginning of this course you will get a breakdown of the world of ethical hacking. If you ever wondered what ethical hacking is or what an ethical hacker does, this is for you. This section will be covered by a certified ethical hacker (CEH) and trainer who has 20 years of experience in the world of information security

Next we will go into Kali Linux which is the ethical hacker’s OS for all things hacking. We will show you how to install Kali using VMWare. We will show you some important configuration settings that you should be aware of and go over some of the top tools in Kali. We will end with a demo on how to crack Wi-Fi passwords on a WEP network.

The last section will dive into penetration testing and specifically the methodologies professional penetration testing teams take to protect businesses. 

Who is the target audience?
  • Anyone interested in cybersecurity
Compare to Other Kali Linux Courses
Curriculum For This Course
43 Lectures
04:27:32
+
Introduction to Ethical Hacking and Security Industry Terminology
7 Lectures 01:00:37


Spoofing and Hijacking
11:37

Cross Site Scripting & Cross Site Request Forgery
08:47

SQL Injection
06:08

Wireless Network Security
10:49

Common Malware
07:02
+
Kali 101
23 Lectures 01:12:10

In this lesson we'll introduce you to Kali and it's use cases. By the end of the lecture you will be able to find where to download Kali and the different options you have for running it.

About Kali and use cases
02:22

In this lesson you'll get guided through the Kali install process on VMware.

Installing and configuring Kali on a VMware Virtual Machine
03:23

In this lesson you'll learn important network settings to help you setup the proper penetration testing enviorment.

Configuring the network adapter
03:54

In this lesson we will teach you the first thing to do when you've successfully booted Kali...Change the default password!

Booting Kali for the first time
02:22

In this lesson we will teach you the first thing to do when you've successfully booted Kali...Change the default password!

Basic commands with Kali and VMware
03:39

In this lesson we'll teach you how to change the host name via the terminal.

Basic Kali Configuration
01:38

In this lesson we'll show you how to request your IP Address.

Configuring your network
01:21

In this lesson you'll learn how to ping your IP address and troubleshoot a DNS Resolution

Requesting and Configuring IP Addresses
03:25

In this lesson you'll learn some of the services that run behind Kali Linux which are Apache, SSH, and MySQL

Managing services in Kali
02:29

In this lesson you'll learn how to manage Apache inside of Kali

Managing Apache in Kali
03:08

In this lesson you'll learn how to manage SSH inside of Kali

Managing SSH in Kali
01:48

In this lesson you'll learn how to manage MySQL inside of Kali.

Managing MySQL in Kali
04:26

This lesson introduces you to the various tools inside of Kali and their use cases

Vulnerability Analysis Tools Overview
03:47

This lesson introduces you to the various tools inside of Kali and their use cases

Tools Overview
01:35

This lesson introduces you to the various tools inside of Kali and their use cases

Information Gathering Tools Overview
01:28

This lesson introduces you to the various tools inside of Kali and their use cases

Maltego
02:25

This lesson introduces you to the various tools inside of Kali and their use cases

Web Applications Tools Overview
02:19

This lesson introduces you to the various tools inside of Kali and their use cases

Burp Suite
01:43

This lesson introduces you to the various tools inside of Kali and their use cases

Password Attacks Tools Overview
00:49

This lesson introduces you to the various tools inside of Kali and their use cases

Ophcrack
01:27

This lesson introduces you to the various tools inside of Kali and their use cases

Armitage
02:19

Cracking Wi-Fi Passwords on a WEP Network
16:22

This lesson introduces you to the various tools inside of Kali and their use cases

Top 10 Security Tools Overview
04:01
+
Penetration Testing Methodologies
7 Lectures 01:30:17
Penetration Testing
11:00

Pen-Testing Techniques
14:32

Scope of Pen-Testing
14:31

Types of Pen-Testing and its Strategies Part 1
12:16

Types of Pen-Testing and its Strategies Part 2
09:07

Types of Pen-Testing and its Strategies Part 3
13:57

Types of Pen-Testing and its Strategies Part 4
14:54
+
BONUS: Labs on Source Code Fuzzing, Infecting MySQL logs and more!
6 Lectures 44:28
Injecting MySQL Logs
12:46

Threat Actor Attribution
06:17

Understanding Heap Overflow Protection
05:59

Source Code Fuzzing Lab: Crash Analysis using American Fuzzy Lop
06:10

Intercepting Process Injection on Suspended Threads
13:16

Bonus Lecture: Get access to all our cybersecurity courses with a deep discount
00:00
About the Instructor
CyberTraining 365
4.1 Average rating
2,485 Reviews
47,963 Students
16 Courses
Best Selling Instructor, 30,000+ Students

 Join the Cyber Security Industry in 2017!

Interested in starting a career in the Cyber Security Industry? 2017 is the time! 

Learning the fundamentals of Cyber Security provides you with a powerful, and very useful, set of skills. Learn to think like a hacker so you can better defend your networks and data by studying Penetration Testing and Ethical Hacking.   

Jobs in Cyber Security are plentiful. Receiving your Certified Ethical Hacker, Certified Hacker Forensic Investigator, Penetration Tester and Security+ certification will give you a strong background to more easily tackle and pick up more advanced exams, such as the CISSP certification.  

Get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over one million Cyber Security job openings globally. Demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

But, don't take our word for it... take a look at the FREE previews (they are available in all our courses) and see for yourself!

About Us:

CyberTraining 365 is an online academy that offers most in-demand cybersecurity training and certification through different subscription models. Members have access to the ever growing library of quality, engaging videos that are taught by some of industry’s best and most recognized experts.

CyberTraining365 is powered by Social27's patented cloud-based eLearning platform, providing members with an engaging and collaborative learning environment. Through best in class content, social learning tools, and gamification, CyberTraining365 is taking eLearning from Isolation to Collaboration.

Samy Mkacher
4.3 Average rating
1,313 Reviews
37,666 Students
10 Courses
Join my army of 35,000+ superlearners!

(Français plus bas)

Why more than 35,000 students chose me as their instructor?

♜ Enroll in one of my courses and you'll see! ♜ 

1. Each of my courses is organized in a clear and precise manner. I always make sure that you know the prerequisite to teach you a new concept. 

2. I have a background in both humanities and computer science. It gives me an holistic view of teaching and pedagogy. 

3. To me, anything can be learned if you put in enough effort and persistence.

What makes me an ideal instructor?

1. I graduated a Master of Research  in Logics & Epistemology from the Sorbonne, Paris.   2. I have a background in computer sciences and programming languages such as C, C++, Python and Java. 

3. Because I came to learn technical skills quite late in my life, I have a very pedagogical way of teaching things ! 

≫ What can I do for you? Enroll in one of my courses and you'll see! ≪


Pourquoi plus de 35 000 étudiants m'ont choisi comme instructeur ? 

♜ Suis l'un de mes cours et tu verras ! ♜ 

1. Chaque cours que j'instruis est organisé de manière claire et précise. Je m'assure toujours que tu aies les pré-requis pour aborder une notion.
2. J'ai un double background en sciences humaines et sciences informatiques. Cela me permet d'avoir une vision d'ensemble de la pédagogie.
3. À mes yeux, tout peut être appris avec assez de volonté et de persistance.

Qu'est-ce qui fait de moi ton instructeur idéal ?

1. J'ai suivi un cursus universitaire solide et j'ai un Master de recherche de la Sorbonne en Logique et Épistémologie.
2. J'ai un background en sciences informatiques et dans les langages de programmation C, C++, Python et Java.
3. Parce que j'ai appris des sujets techniques assez tard dans ma vie, j'ai une manière très pédagogique d'instruire mes étudiants. 

≫ Que puis-je faire pour toi ? Suis l'un de mes cours et tu verras !