Start Ethical Hacking with Parrot Security OS (Alt. to Kali)
- No prior Linux, programming or hacking knowledge required
- A Computer with Internet connection
- Passionate curiosity for learning (is a must)
- Basic IT Skills (is plus to have)
This is a crash course to give you a firm understanding of the whole Ethical Hacking world, what technics and tools are used, and what kind of work awaits you if you shift your career to the cybersecurity field.
This is an abstract of our +40 hours masterclass called "Applied Ethical Hacking and Rules of Engagement".
You can do the whole tutorial using another flavor of Linux, preferably a security-enhanced Linux such as Kali Linux or BlackArch.
Here is a breakdown of this crash course:
Setup Virtualization Tech
Install Attacker OS: Parrot Security OS | Kali Linux
Install Victim OS: Metasploitable3 | Windows Server | Ubuntu Linux | HackTheBox
Reconnaissance: targets, names | IP address scopes | technologies, etc.
Service Scanning using NMAP
Vulnerability Scanning: Rapid7 Nexpose | Nessus | OpenVAS
Exploitation: Metasploit | searchsploit or GitHub
Red-Teaming concepts and tools: Empire3 | Cobalt Strike
The outcome of this crash course is to understand clearly what ethical hacking and penetration testing are and if you would like to shift to this field. This course is 100% practical and hands-on. All you require to finish it is a computer and internet connection.
All the software used in the course are free to use for educational purposes or 100 percent open source.
Who this course is for:
- Anyone who would like to start his career in ethical hacking, penetration testing and cyber security
- Anyone who would like to have a basic understanding of ethical hacking world
- Linux lovers, especially security enhanced distros
He has +15 years of computing and information technology experience in high-tech research institutes at the Goethe University of Frankfurt and the Automotive Industries in Germany.
# Networking and Cyber Security Expert in the Automotive Industry
# Online instructor on Udemy & Hackerz Exposed (content creator for networking and cyber security)
# Project team member for Trusted Information Security Assessment Exchange (TISAX)
# Advanced networking (Cisco, Fortinet, Cumulus, Open-Source...)
# Network security e.g. NAC, VPN, next-gen firewalls, IDS/IPS, L2/L3 segmentation
# SIEM, threat hunting, and advanced network monitoring
# Endpoint Protection, and Microsoft Endpoint Manager
# Vulnerability management
# Penetration testing for blue teaming purposes
# Scripting in Bash & PowerShell
# Python programming
# Microsoft servers and cloud technologies
# Linux server technologies
# Virtualization e.g. VMware ESXi, Hyper-V, GNS3, and KVM...
# Datacenter servers, Cisco UCS, Dell Blade, NetApp, and Dell storage solutions
# Project Management
# Database programming & design (SQL)
# (BSc.) IT and Computing (specialization: software development) - Open University, UK.
# (B.A.) Linguistics (IUIK. Iran)
# Languages: German, English, Persian
Following the German motto: "man learnt nie aus", meaning you live and learn, Farshid is always keen on new trends in networking and cybersecurity by keep learning on online platforms and extending his experience in networking and security at his GNS3-powered home lab or online virtual labs such as HackTheBox and other “capture the flag” type of labs.
With over 13 years of experience I have done projects in the fields of : Red Teaming (CS4, CALDERA, Empire, C2 Development), Blue Teaming (Splunk ES & Threat Hunting App), Penetration Testing (Web, Mobile, Network, Vulnerability Assessment, Hardening CIS/DISA), Scripting (Python, Golang,Bash, Powershell, Sleep), Capture The Flag Competitions, Bug Bounty Hunting, Langs: English-German-Persian