Ethical Hacking - Kali Linux Fundamentals

Understanding the basic of Kali 2021
New
Rating: 4.5 out of 5 (18 ratings)
2,186 students
English
English [Auto]
Linux Fundamentals
common Linux commands that hackers use
Crafting a basic exploit to hack a your first victim

Requirements

  • Basic understanding of computer concepts
  • Basic understanding of IP address is helpful
  • The desire to become and ethical hacker and have the willingness to learn, adapt, and grow

Description

Welcome this course is a basic overview of Kali Linux 2021. We cover basic setup, terminal navigation, and some core operating system structure. This is a great course if you haven't really used Kali Linux at all and you want to get your feet wet. Remember that this is a basic overview of Kali Linux core functions. There are three main sections. The first is focused on why this course exists. The second section is on Linux basics including the file system, boot process, and terminal navigation and manipulation. The third section is on Linux administration and understanding users, permissions, groups, and understand permission at a deeper level. I do cover basics on checking services in the third section also. There is a single video in the fourth section that is about crafting a basic exploitable EXE and setting up a handler to perform someone first meterpreter shell.


Because this is an overview there is not a lot of practical examples, however I do have assignments that ask you to accomplish some tasks so that you can see how to accomplish certain things. These assignments are made to build retention and understanding of what was being covered in the course. Thank you


Who this course is for:

  • You have no prior experience with Linux and would like to learn how to use Kali Linux
  • You want to learn how to set up a lab and hack your victims using Kali Linux
  • You have basic understanding of ethical hacking and want to learn how to do it using Kali Linux

Course content

4 sections16 lectures1h 59m total length
  • Purpose
    01:21
  • Disclaimers
    04:05
  • The Beginning
    07:34
  • Lab Setup
    10:15
  • Lab Setup - Guidelines
    3 questions

Instructor

Skilled Cyber & Networking Instructor
Arthur Salmon
  • 4.5 Instructor Rating
  • 152 Reviews
  • 14,519 Students
  • 4 Courses

Hello, my name is Arthur Salmon, currently I hold an Applied Doctorate in Information Assurance & Cybersecurity. I hold a Master’s degree in network and Communication Management focusing on IT Security. I have worked in IT for 20 years, with 10 of them being in an IT Security role. I have spent 6 years doing red-team work for private organizations, and just over 5 doing blue-team work for medium businesses. While my primary job role is in education, I spend allot of time working in the field and moving cybersecurity industry forward as a whole. I hold advanced certifications such as CISSP, CEH, and several Cisco CCNPs. I have also worked internally working to update Cybersecurity programs, courses and training facilities to aid in their modernization. Currently, I am working on coordinating western regional colleges into a more competition focus pathway as well as aiding in the development of competency-based assessments in Cybersecurity curriculum. When I am not working on aiding in education development, I own and operate a MSP in the greater Las Vegas area aiding small/medium business in meeting compliance and regulatory requirements.