Kali Linux Tutorial For Beginners
4.5 (2,994 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
30,139 students enrolled

Kali Linux Tutorial For Beginners

#1 Ranking Kali Linux Tutorial! Learn from the pros how to use Kali Linux easily and quickly.
Bestseller
4.5 (3,000 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
30,139 students enrolled
Last updated 8/2020
English
English [Auto], French [Auto], 1 more
  • Italian [Auto]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 8.5 hours on-demand video
  • 7 articles
  • 1 downloadable resource
  • Full lifetime access
  • Access on mobile and TV
  • Assignments
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Perform basic to advanced tasks in Kali Linux
  • Hack your way through multiple customized targets
  • Learn how the good guys hack and how the bad guys hack (and get your hands on the credit cards!)
  • Understand how native Linux commands can be used by hackers
  • Build up a Linux target from scratch to hack with Kali Linux
  • A lot more!
Requirements
  • Basic understanding of concepts such as IP addresses, NAT, client, server etc.
  • Basic understanding of ethical hacking concepts such as ports scanning, vulnerability scanning etc.
  • Desire to become and ethical hacker and willingness to learn and persevere
Description

Note: Course updated for Kali 2020

You want to learn hacking with Kali Linux but you do not know where to start? Do you find the command line confusing and intimidating? If yes, this is the perfect course for you. In this Kali Linux tutorial, we start you off with the assumption that you know absolutely nothing about Linux! Starting from scratch you will build up your knowledge on how to use Kali Linux and before you know it you will become fluent with the basic tools and commands not just in Kali, but in most Linux systems.

=================================================================================================================

Completing this short, impactful course was the smartest 11 dollars I have spent this year! The material was relevant and provided a great refresher for concepts I knew about but hadn’t exercised in awhile, and it introduced to me entirely new methods for scanning and imposing hacks. I will continually come back to the course to reinforce my understanding of the material. Money well spent. - Carl Bradford ★★★★★

=================================================================================================================


"This course was incredibly helpful and I learned a lot as a complete linux noob and am definitely more knowledgable and confident in not only the OS itself, but also the specialized Kali distro." - Olivia R. McLaughlin ★★★★★

=================================================================================================================

The course is divided into three parts.

Part 1 - Basics

  • Commands to help you navigate any Linux system

  • Add/remove software and update/upgrade your system

  • Archive and compress files and folders

  • Use wildcards to make daily tasks easier

Part 2 - Administration

  • Editing files

  • Configuring and managing services

  • Managing users, groups and permissions

  • Chaining multiple commands for greater effect

Part 3 - Hacking

  • Download a minimal Linux and build it from scratch

  • Hack it with Kali Linux!

Part 4 - Shells

  • Understanding bind shells

  • Understanding reverse shell

  • Understanding web shells

Part 5 - Hacking Like The Bad Guys

  • Exploiting replicas of real life vulnerabilities

  • Getting access and creating backdoors

  • Stealing credit card information

By the end of the course you will have the skills to:

  1. Use common Linux commands like hackers do

  2. Build a Linux target from scratch

  3. Hack the target using what your learnt in the Kali Linux tutorial

  4. Create shell and backdoors

  5. Understand and replicate what the bad guys do

Please  note that this course builds up on some ethical hacking concepts taught  in the Hacking For Beginners ethical hacking course. This is another course provided by Hackers Academy

=================================================================================================================

"This  is what was required to start using kali linux for ethical hacking  purpose i'm really thankful to the author and the udemy team to provide  me and other n00bs like me a free platform where we can learn basics. To  all other folks don't wait to enroll if you're new to linux. This guy  is a genius" - Syed Mohammad Raza ★★★★★

=================================================================================================================


Who this course is for:
  • You have no prior experience with Linux and would like to learn how to use Kali Linux
  • You have basic understanding of ethical hacking and want to learn how to do it using Kali Linux
  • You want to learn how to create targets and hack them using Kali Linux
Course content
Expand all 81 lectures 08:31:08
+ Welcome!
3 lectures 15:32
On Udemy's Ratings
01:41
Let's Connect!
00:07
+ Part 1 - Building The Foundations
22 lectures 01:52:38
Kali GUI Differences
00:19
Kali Linux Terminal
07:20

What a remote shell looks like.

Your First Shell
00:22
Kali Linux root, root and root
06:36
Basics Of Commands
04:51
Navigating directories
02:44
Creating directories
01:50
Listing directory contents
06:05
Listing files content
03:34
Copying files and directories
05:12
Moving files and directories
04:13
Removing files and directories
04:20
Adding/removing software and updating/upgrading your system
06:13
Understanding where software on Kali Linux comes from
05:43
Troubleshooting Installations
00:03
APT changes in Kali Linux 2018
04:13
Archiving files and directories
15:11
Using wildcards to speed up tasks
14:20
How to get help when needed
06:16
End Of Part 1
02:59
+ Part 2 - Administration
12 lectures 01:32:24
Networking basics on Kali Linux
05:35
How to edit files with nano
06:25
Turning your Kali Linux into a Web Server
09:15
Configuration file changes in Kali Linux 2018
02:56
Turning your Kali Linux into an SSH server
08:40
Managing users and groups
11:01
Maintaining permissions of users
09:31
Understanding processes
08:56
Managing processes
08:18
Command redirection and controlling output
06:35
Chaining multiple commands together
11:51
End of Part 2
03:21
+ Part 3 - Hacking With Kali Linux
20 lectures 02:30:16
IMPORTANT: Kali and target connectivity
00:19
Set up your target
05:49
Port scanning with Kali Linux
06:59
Port scanning using Kali Linux graphical interface
04:37
Hacking with Kali Linux - FTP hacking
08:22
Vulnerability scanning with Kali Linux
05:27
Hacking with Kali Linux - SSH hacking
11:58
Hacking with Kali Linux - Web service hacking
10:29
Hacking with Kali Linux - Database hacking and password attacks
17:46
Hacking With Kali Linux - Password Cracking
08:51
Hacking with Kali Linux - Sniffing passwords
11:42
Hacking with Kali Linux - Privilege Escalation
05:56
Auto Hacking with Armitage - Part 1
13:37
Auto Hacking with Armitage - Part 2
05:43
Hacking with Kali Linux - Quick recap of favorite tools
05:56
Download and build the target
19:03
Can You Hack This?
01:42

Read if you're stuck in the previous target.

Can You Hack This - Hints
00:05
Can you Hack This - Solution
00:09
+ Part 4 - Shells Used By Good And Bad Guys
7 lectures 39:20
Understanding basic web shells
06:35
Understanding bind shells
08:08
Understanding reverse shells
01:57
Quick recap
02:25
Creating a Metasploit backdoor
11:53
Bad guy's interactive shell
05:26
Bad guys web shells
02:56
+ Part 5 - Steal The Credit Cards: Hacking Like The Bad Guys
12 lectures 01:14:57
First Mission
03:06
Port scanning
03:41
Vulnerability Scanning
02:42
Vulnerability Scanning Using Nmap
08:18
Initial Break-in
09:02
Getting an Interactive Shell
08:58
Changing SSH config
04:36
Getting SSH Access
05:08
Cracking Users' Passwords
07:23
Attacking Database Authentication
04:04
Stealing The Credit Card Info
09:03
Second Mission
08:56
+ Final Mission
1 lecture 02:41
Hack your final traget
Final Mission
1 question
What's Next?
02:41