An Introduction to Ethical Hacking with Kali Linux
4.1 (10 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
840 students enrolled

An Introduction to Ethical Hacking with Kali Linux

A perfect introduction to the world of ethical hacking and penetration testing with Kali Linux
4.1 (10 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
840 students enrolled
Created by Scott Cosentino
Last updated 1/2020
English
English [Auto-generated]
Current price: $34.99 Original price: $49.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 3.5 hours on-demand video
  • 2 articles
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Ethical Hacking
  • Kali Linux
  • Information Gathering
  • Vulnerability Analysis
  • Web Application Analysis
  • Exploiting Vulnerabilities
  • DNS Analysis
  • IDS and IPS Detection
  • Live Host Identification
  • Network and Port Scanners
  • OSSINT
  • Enum4Linux
  • Dmitry
  • Recon-ng
  • Sparta
  • Nikto
  • Unix-privsec-check
  • Wpscan
  • Burp Suite
  • Wfuzz
  • Commix
  • Sqlmap
  • Metasploit
  • nmap
Requirements
  • A basic understanding of Linux
Description

Learn ethical hacking through Kali Linux, one of the leading Computer Security operating systems! In this course, you will learn how to gather information, detect vulnerabilities, and exploit them using tools in Kali Linux. This course will give you all of the tools you need to be able to test your own servers and applications for vulnerabilities.

Computer Security is one of the fastest-growing fields in tech, and ethical hacking is one of the best skills to learn in the field. With a new attack being completed every 39 seconds, it is essential that security experts are equipped with the most powerful tools for the job. The tools in Kali Linux are commonly used by attackers and defenders to help secure their systems. Learning these tools will allow you to secure your system before the attackers get to it!

You will learn:

  1. DNS Analysis

  2. IDS and IPS Detection

  3. Live Host Identification

  4. nmap

  5. OSSINT

  6. Enum4Linux

  7. Dmitry

  8. Recon-ng

  9. Sparta

  10. Nikto

  11. Unix-privesc-check

  12. wpscan

  13. Burp Suite

  14. wfuzz

  15. commix

  16. Sqlmap

  17. Metasploit

You will learn how to exploit common vulnerabilities in Linux and Windows, as well as how to find common vulnerabilities in web apps such as command injections, and SQL injections.

I am currently working in the Computer Security field, which means that I am knowledgable in the most current attacks and tools used in the field. I have worked on many large projects which involve discovering vulnerabilities, so most of my work is focused on the detection and research of vulnerabilities in live, in-market applications. I will show you how to use Kali Linux to be able to detect these types of vulnerabilities in your live applications.

Don't get hacked, learn Kali Linux today, and gain a set of skills that will add major value to your career!

Who this course is for:
  • Computer users who look to expand their understanding of ethical hacking and computer security
Course content
Expand all 23 lectures 03:20:02
+ Introduction
6 lectures 20:32
Installing Kali Linux
07:25
Setting up Virtual Machines
06:35
Setting up Web Servers and Vulnerable Applications
04:16
login.php
00:28
Command.php
00:18
+ Information Gathering
9 lectures 01:13:55
IDS and IPS Detection
06:18
Live Host Identification
06:47
Network and Port Scanners
12:32
Open Source Intelligence
09:53
Enum4Linux
04:44
Dmitry
06:16
Recon-ng
05:11
Sparta
08:38
+ Vulnerability Analysis
2 lectures 17:24
Nikto
08:53
unix-privesc-check
08:31
+ Web Application Analysis and Exploitation
6 lectures 01:28:11
wpscan
07:28
Burp Suite
11:26
Wfuzz
12:47
Commix
09:46
Sqlmap
18:15
Metasploit
28:29