The Kali OS Uses In Cyber Security
3.1 (113 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
11,280 students enrolled

The Kali OS Uses In Cyber Security

Learn cyber security hacking using kali linux. A comprehensive hacking guide!
New
3.1 (113 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
11,280 students enrolled
Last updated 5/2020
English
English [Auto]
Current price: $135.99 Original price: $194.99 Discount: 30% off
11 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 40 mins on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Getting Comfortable with Kali Linux
  • Best Hacking Tools - Free
  • Buffer Overflow Hacking
  • Privilege  Escalation
  • Password Hacking
Requirements
  • No Prior Knowledge Or Work Is Necessary To Take This Course
Description

At the beginning of this course you will get a breakdown of the world of ethical hacking. If you ever wondered what ethical hacking is or what an ethical hacker does, this is for you.We will go into Kali Linux which is the ethical hacker’s OS for all things hacking. We will show you how to install Kali using VMWare. We will show you some important configuration settings that you should be aware of and go over some of the top tools in Kali. We will end with a demo on how to crack Wi-Fi passwords on a WEP network.

Who this course is for:
  • Hacking Web Applications
Course content
Expand 7 lectures 39:46
+ The Kali OS Uses In Cyber Security
7 lectures 39:46
Buffer Overflow Hacking - Part 1
05:45
Buffer Overflow Hacking - Part 1
05:32
Privilege  Escalation
05:48
Password Hacking - Part 1
05:20
Password Hacking - Part 2
05:27