Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ Microsoft AZ-900
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Personal Transformation Life Purpose Meditation CBT Emotional Intelligence
Web Development JavaScript React CSS Angular PHP Node.Js WordPress Vue JS
Google Flutter Android Development iOS Development React Native Swift Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
Microsoft Power BI SQL Tableau Business Analysis Data Modeling Business Intelligence MySQL Data Analysis Blockchain
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Business Plan Startup Online Business Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Kali Linux

Kali Linux: Pentesting with Kali Linux: 2-in-1

Learn how to completely protect your network by pentesting using Kali Linux
Rating: 3.8 out of 53.8 (10 ratings)
94 students
Created by Packt Publishing
Last updated 8/2018
English
30-Day Money-Back Guarantee

What you'll learn

  • Get to brace with latest techniques and methods to defeat even the toughest threats
  • Learn to build your own pentesting lab environment & practice advance techniques
  • Explore a massive variety of stealing techniques to bypass variety of protections when penetration testing
  • Learn to penetrate WEP security using tools such as Aircrack-ng, Wifite .py, and Nethunter
  • Learn encryption-cracking skills and gain insights into methods used by top pentesters and ethical hackers

Requirements

  • Basic knowledge of networking is required.

Description

With advance hackers and threats always on the increase in our virtual world ,proficiency with pentesting is an absolute necessity for individuals & organization trying to secure their systems. 

With this[1] comprehensive 2-in-1 course you will get an complete [2] insight into penetration testing, it'll walk you through the pentesting environment and tools required to perform penetration testing, giving you an edge in knowing more about wireless security used in today's networks. Moreover it additionally helps you to gain knowledge on how penetration attack on wireless networks and protocols works. This course ensure that you be successful in any of the penetration tests that you perform by providing you test challenges at the end of the course.

Contents and Overview

This training program includes 2 complete courses, carefully chosen to give you the most comprehensive training possible.

The first course, Getting Started with Pentesting, covers tools & techniques to increase your success in pentesting. It gives you detailed instruction in information gathering to perform attacks on target. Whether you are a beginner or an intermediate learner, this course will provide you skills required to be successful in creating & planning advanced penetration test.

The second course, Wireless Penetration Testing for ethical Hackers, starts with serving to you to decide on right tools to perform penetration testings.You will additionally learn the way to carry out wireless penetration attacks against wireless networks and their protocols so as to create strong and sturdy security systems using the foremost popular tools in the penetration testing community.

By the end of the Learning Path, you will get hands-on how to set up complete wireless penetration testing lab! And would be able to carry out wireless network reconnaissance,sniffing, etc. 

About the Authors:

  • Tajinder Kalsi has more than nine years working experience in IT field, tajinder has conducted seminars in engineering colleges all across india, on topics such as information security, android application development, website development, and cloud computing. He has worked in more than 120 colleges with over 10,000 students. In his spare time, he has also worked as a technical reviewer for Packt and has reviewed the following books Web application penetration testing with kalI Linux and mastering kali Linux for advanced penetration testing. He is best described as dedicated, devoted, and determined and a person who strongly believes in making his dreams come true. He defines himself as a tireless worker, who loves to laugh and make others laugh.

  • Jason Dion, CISSP No. 349867, is an adjunct instructor at liberty university’s college of engineering and computational science and anne arundel community college’s department of computing technologies with multiple information technology professional certifications, including certified information systems security professional (CISSP), certified ethical hacker (CEH), certified network defense architect (CNDA), digital forensic examiner (DFE), digital media collector (DMC), security+, network+, a+, and information technology infrastructure library v3. With networking experience dating back to 1992, Jason has been a network engineer, deputy director of a network operations center, and an information systems officer for large organizations around the globe.

Who this course is for:

  • This learning path is for ethical hackers, security analyst, penetration testers from beginners to advanced learners who would love to improve their skills in securing their networks by performing penetration testing. This learning path is also for users fascinated about finding security vulnerabilities in wireless standard protocols such as WEP, WAP.

Course content

2 sections • 50 lectures • 5h 34m total length

  • Preview02:26
  • Installing Kali Virtual Machine
    06:27
  • Setting Up Metasploitable2
    03:19
  • Setting up Kali Virtual Machine
    04:37
  • Setting up Third Party Tools on Kali
    08:12
  • Preview04:19
  • Pentesting Methodology
    08:18
  • Gathering the Client Requirements
    05:03
  • Target Scoping
    02:52
  • Walkthrough of Kali
    10:40
  • Using Nmap
    17:04
  • Introduction to the Metasploit Framework
    13:06
  • Wireshark Basics
    11:04
  • A Burpsuite Walkthrough – Basics
    10:56
  • Preview04:53
  • Using NsLookup
    05:17
  • Using Traceroute/Tracert
    11:22
  • Gathering Open Web Information
    08:42
  • Scanning Using Nmap
    08:45
  • Detailed Walkthrough - Nmap
    07:51
  • Nmap Scripting Engine (NSE)
    09:01
  • Scan Types – Nmap
    09:30
  • Exporting Nmap Scan Output
    05:45
  • Introduction to Zenmap – Graphical Nmap
    06:39
  • Banner Grabbing with Netcat
    06:38
  • Test your knowledge
    5 questions

  • Preview03:01
  • Installing Kali Linux in VirtualBox
    08:16
  • Installing NetHunter on Android
    07:04
  • Wireless Networks
    05:44
  • Concealing and Changing Your MAC Address
    09:44
  • Scanning the Airwaves
    08:40
  • Promiscuous Mode
    06:07
  • Hunting for Networks
    03:36
  • Information Gathering with Airodump-ng
    05:36
  • WEP Security
    04:03
  • Setting Up the WEP Access Point
    03:57
  • Cracking WEP Using Aircrack-ng
    10:16
  • Cracking WEP Using Wifite.py
    02:37
  • Cracking WEP Using NetHunter
    05:35
  • WPA/WPA2 Security
    03:26
  • Brute Force Versus Dictionary Attacks
    06:00
  • Setting Up the WPA2 Access Point
    02:45
  • Cracking WPA2 Using Aircrack-ng
    10:53
  • Cracking WPA2 Using Wifitie.py
    05:33
  • Cracking WPA2 Using NetHunter
    08:02
  • WiFi Protected Setup (WPS)
    03:24
  • Setting Up WPS
    02:43
  • Attacking WPS Using Wash, Reaver, and Bully
    07:12
  • Attacking WPS Using NetHunter
    04:44
  • Conclusion
    03:09
  • Test your knowledge
    5 questions

Instructor

Packt Publishing
Tech Knowledge in Motion
Packt Publishing
  • 3.9 Instructor Rating
  • 58,980 Reviews
  • 353,952 Students
  • 1,418 Courses

Packt has been committed to developer learning since 2004. A lot has changed in software since then - but Packt has remained responsive to these changes, continuing to look forward at the trends and tools defining the way we work and live. And how to put them to work.

With an extensive library of content - more than 4000 books and video courses -Packt's mission is to help developers stay relevant in a rapidly changing world. From new web frameworks and programming languages, to cutting edge data analytics, and DevOps, Packt takes software professionals in every field to what's important to them now.

From skills that will help you to develop and future proof your career to immediate solutions to every day tech challenges, Packt is a go-to resource to make you a better, smarter developer.

Packt Udemy courses continue this tradition, bringing you comprehensive yet concise video courses straight from the experts.



  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.