Ethical Hacking - Basics (Kali 2021)
- Require patience and time to spend on this course.
- Basic IT Skill, Example: Being able to use a computer device at a beginner level.
- Basic understanding of IP Networking (would be helpful)
- Good computer with atleast 4GB RAM and relaible internet connnection
Kali is a penetration testing Linux distribution created by Offensive Security. It holds a repository of multiple tools for security-related engineers including hacking wireless networks, web applications, databases, Reverse engineering, password crackers, and much more! As you can see, Kali is a versatile and powerful tool for anyone looking to do any cybersecurity-related work.
Keep in mind this is a basics course, which means this course is a beginner’s guide to getting started in Kali…to get your feet wet. The course is broken down into several sections focusing on certain aspects of the ethical hacking process. Starting off with an overview of Kali and its use cases then offer a step-by-step walkthrough of installing Kali using VMware. Next, we teach you some important configuration settings in the distribution including configuring your network and managing services in Kali. Knowing these procedures will help you set up the proper environments when using Kali and its tools.
We will cover the five phases and the tools used in each phase, again this is an introduction so we may not go super in-depth but you will leave with a basic understanding of how to do things and why they are done in each phase. Because of issues with Udemy free courses being less than two hours I am not able to add additional content. However, I will be publishing more free courses. I will be publishing a more focused Course on each of the phases.
The goal is to provide you with basic knowledge to get you started so you can take it from there. Remember this is not a field that you have can walkthrough. You will have to grow and adapt as the environment changes.
Who this course is for:
- Anybody who want to learn about Ethical Hacking
- Any person willing to learn how to make their own penetration testing lab
- 04:33What's New in Kali
- 16:38Setting up the Lab Environment
- 03:10Updating Kali
- 02:02Basics of Ethical Hacking
- 02:13Understanding Methodology
Hello, my name is Arthur Salmon, currently I hold an Applied Doctorate in Information Assurance & Cybersecurity. I hold a Master’s degree in network and Communication Management focusing on IT Security. I have worked in IT for 20 years, with 10 of them being in an IT Security role. I have spent 6 years doing red-team work for private organizations, and just over 5 doing blue-team work for medium businesses. While my primary job role is in education, I spend allot of time working in the field and moving cybersecurity industry forward as a whole. I hold advanced certifications such as CISSP, CEH, and several Cisco CCNPs. I have also worked internally working to update Cybersecurity programs, courses and training facilities to aid in their modernization. Currently, I am working on coordinating western regional colleges into a more competition focus pathway as well as aiding in the development of competency-based assessments in Cybersecurity curriculum. When I am not working on aiding in education development, I own and operate a MSP in the greater Las Vegas area aiding small/medium business in meeting compliance and regulatory requirements.