Kali Linux - Hacking for beginners
4.3 (417 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
23,782 students enrolled

Kali Linux - Hacking for beginners

Ethical Hacking and penetration testing with Kali Linux! (incl. do a first hacking challenge on our website)
New
4.3 (417 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
23,782 students enrolled
Created by Hubert Seitzweder
Last updated 6/2020
English
English
Current price: $30.99 Original price: $44.99 Discount: 31% off
23 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 3.5 hours on-demand video
  • 1 article
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Learn basic hacking task in kali linux
  • Perform penetration testing on targets
  • Basics of ethical hacking
  • Web hacking for beginners
  • Protect and encrypt your data in the right way
  • Perform in a hacking-challenge on our webserver
Requirements
  • Basic understanding of ip-adresses and client-server communication
  • Basic understanding of set-up a virtual machine with VM-Ware
  • Basic understanding of ethical hacking (how to behave correct :-)
Description

Start your hacking career with kali linux. In this kali linux tutorial you do not need to know anything about unix and linux systems.
You find the command line confusing? If yes, this is the perfect course for you. Starting from the scratch you will build up your hacking- and command-line knowledge on how to use Kali linux as ethical hacker for penetration testing or for other purposes. You will become fluent with the basic tools and commands.

"This course was incredibly helpful. I learned a lot and i am more confident not only in the kali os, but also in the command-line and in the security tools. Sometimes Huberts german accent was hard to undertand. At the end I succeeded in the final hacking-challenge and had a lot of fun with their web hacking-quest. " - Jana Miller ★★★★★

The course is divided into six main parts.

Part 1 - Hacking into the system

  • Try to get direct access on a server by

    using Brute-Force Tools

Part 2 - Hacking the system with exploits

  • Try to get access on the system or services by

    using exploits

Part 3 - Hacking encrypted passwords

  • Try to crack encrypted offline data by

    using Cracking-Tools

Part 4 - Hacking Websites and Databases

  • Try to get on a webserver or into a database by

    using advanced techniques

Part 5 - Hacking the LAN/WLAN data

  • Try to capture the network traffic by

    using network sniffers and try to break into a wifi

    network

Part 6 - Hacking with Payloads/Phising

  • Try to create and send a trojan by

    using msfvenom


THIS COURSE HAS A HACKING-CHALLENGE INCLUDED! 
(YOU MIGHT WANT TO TRY IT AS FINAL TEST)

This couse concentrates highly on direct, practical exercises which you could do for yourself.
You are allowed to attack our webserver and to try all the things you learned on it.

By the end of the course you...

  1. know how to attack targets

  2. know how to build trojans

  3. know how to analyse and capture network traffic

  4. know how to crack weak passwords and how to create safer ones

  5. understand and replicate what the bad guys do :-)

Who this course is for:
  • Users who desire to learn hacking
  • This is NOT for guys on intermediate and advanced level!
Course content
Expand all 39 lectures 03:24:18
+ KALI OS download and configuration
4 lectures 16:44
Kali Installation in a virtual Machine
02:10
Test-System Installation in a virtual Machine
02:08
IT Security Explanations (optional)
02:21
Important Unix-Commands
10:05
+ Hacking into the system
9 lectures 50:47
Information gathering with NMAP
09:39
Information gathering with ZENMAP
07:38
Generate and use a wordlist with CUPP
06:07
Hashvalues explained (optional)
04:24
Remote-Console Attack explained (optional)
05:29
Brute-Force Attack with MEDUSA
05:11
Brute-Force Attack with HYDRA
04:08
Proxy-Server explained (optional)
03:05
Stay anonymous with PROXYCHAINS
05:06
+ Hacking encrypted passwords
7 lectures 32:29
Crack passwords with HASHCAT
05:27
Crack passwords with JOHN THE RIPPER
02:20
Crack zip-files with JOHN THE RIPPER
04:30
Crack Windows 7/10 with Win-Repair-CD
05:57
Crack Windows 7/10 with USB-Device (kali)
06:06
Create bootable USB-Device (kali)
02:20
Create a encrypted hdd with VERACRYPT
05:49
+ Hacking Websites and Databases
5 lectures 24:46
Script-Attacks with the BURP-SUITE
07:15
Man-In-The Middle Attack explained
03:06
Database-Attack with SQLMAP
07:20
Backdoor-Attack with WEEVELY
04:12
+ Hacking the LAN/WLAN data
4 lectures 28:42
Network-Sniffer explained (optional)
03:15
Capture network traffic with WIRESHARK
05:55
Filter network traffic with WIRESHARK
06:22
Attack a WIFI/WLAN with AIRCRACK-NG
13:10
+ Hacking with Payloads/Phising
4 lectures 28:14
Create a trojan with MSFVENOM
12:52
Detect a trojan-attack with VIRUSTOTAL
03:15
Reduce trojan detection-rate with encoders
04:31
Create a phising-attack with SET
07:36
+ Add-On: Steganography
1 lecture 09:02
Hide data with the STEGOSUITE
09:02