Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ Microsoft AZ-900
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Personal Transformation Mindfulness Life Purpose Meditation CBT Emotional Intelligence
Web Development JavaScript React CSS Angular PHP Node.Js WordPress Vue JS
Google Flutter Android Development iOS Development React Native Swift Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
Microsoft Power BI SQL Tableau Business Analysis Data Modeling Business Intelligence MySQL Data Analysis Blockchain
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Business Plan Startup Freelancing Online Business Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Penetration Testing

Penetration Testing with KALI and More: All You Need to Know

Ethical Hacking with KALI LINUX
Rating: 4.2 out of 54.2 (883 ratings)
44,366 students
Created by Mohamad Mahjoub
Last updated 12/2020
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Learn simplified ethical hacking techniques from scratch
  • Perform an actual Mobile attack
  • Master 2 smart techniques to crack into wireless networks
  • Learn more than 9 ways to perform LAN attacks
  • Learn Linux basics
  • Learn 10+ web application attacks
  • Learn more than 5 proven methods of Social Engineering attacks
  • Obtain 20+ skills any penetration tester needs to succeed
  • Make better decisions on how to protect your applications and network
  • Upgrade your information security skills for a new job or career change
  • Learn how to write a professional penetration testing report
  • Course is constantly being updated, so the knowledge you will acquire will always be applicable

Requirements

  • Intermediate computer knowledge
  • Fair knowledge of Windows systems
  • Networking basics
  • Programming basics
  • Web applications basics
  • Mobile applications basics
  • General idea about information security

Description

Welcome to this comprehensive course on penetration testing with KALI. The course examines the various penetration testing concepts and techniques employed in a modern ubiquitous computing world, and will take you from a beginner to a more advanced level. We will discuss various topics ranging from traditional to many modern ones, such as Networking security, Linux security, Web Applications structure and security, Mobile Applications architecture and security, Hardware security, and the hot topic of IoT security. At the end of the course, I will show you some real attacks. Course is constantly being updated, so the knowledge you will acquire will always be applicable.


The layout of the course is easy to walk-through, and the videos are made short and engaging. My purpose is to present you with case exposition and show you live demos, while utilizing a large set of KALI tools (Enumeration, Scanning, Exploitation, Persistence Access, Reporting and Social Engineering tools) in order to get you started quickly. The necessary resources and tools are posted for each sections of the course.


Before jumping into penetration testing, you will first learn how to set up your own lab and install the needed software to practice Penetration Testing along with me. All the attacks explained in this course are launched against real devices, and nothing is theoretical. The course will demonstrate how to fully control victims' devices such as servers, workstations, and mobile phones. The course can also be interesting to those looking for quick hacks such as controlling victim's camera, screen, mobile contacts, emails and SMS messages.

At the end of the course you will be equipped with the necessary tools and skills to:

1) Assess security risks by adopting a standard Threat Modeling technique

2) Adopt a structured approach to perform Penetration Tests

3) Protect yourself and the organization you work at

4) Compile security findings and present them professionally to your clients

5) Make the world a safer place


You can as well enjoy the JUICY BONUS section at the end of the course, which shows you how to setup useful portable Pentest Hardware Tools that you can employ in your attacks.


I have put my 14 years of experience into this course by trying to answer many of the questions I had during my journey of learning. I have as well took the feedback and input of many of my students, peers, and professional figures.


I will be happy to answer all your inquiries and connect with you.


Join TODAY and enjoy a life-time access.


PS: The course is available in Arabic as well as Russian versions.


Hack Ethically  !




Who this course is for:

  • Anyone who wants to learn how to secure their systems from hacker
  • Anyone who wants to learn how hackers can attack their computer systems
  • Anyone looking to become a penetration tester (From zero to hero)
  • Computer Science, Computer Security, and Computer Engineering Students

Course content

15 sections • 84 lectures • 6h 43m total length

  • The Undeniable Power of Ethical Hacking
    Preview02:09

  • Preview01:41
  • Different Installation Methods
    00:36
  • Install KALI
    04:13
  • Color Coding for Root User
    00:58
  • Install Windows (Victim's Machine)
    01:42

  • Master KALI Desktop Environment
    02:01
  • Color Coding
    01:32

  • Get Started with Linux Commands
    08:24
  • Explore Main Services and Programs
    05:10

  • Penetration Testing Cycle
    03:53
  • Threat Modeling
    05:32

  • Wireshark Simplified
    06:17
  • How Does Port Scanning Work
    03:59
  • Introducing NMAP
    02:56
  • Understand NETBIOS and SMB Attacks
    02:32
  • NMAP and ZENMAP Simplified
    09:55
  • Execute Man-in-the-Middle Attacks
    08:35
  • Perform a DNS Spoofing Attack
    05:20
  • Identify a DNS Zone Transfer Vulnerability
    03:42
  • Plan DOS and DDOS Attacks
    02:21
  • All-in-one Metasploit Framework
    09:37
  • Transfer the Payload to a Windows Machine
    02:21
  • Preview08:11
  • Explore The Powerful Armitage Tool
    08:07
  • Hide a Payload in a JPEG Image
    03:05

  • Introduction
    07:10
  • WEP Cracking
    01:25
  • WPA and WPA2 Cracking
    06:20
  • WPS Cracking
    04:01
  • Tips to Improve Your Wireless Network Security
    00:49

  • Web Applications Security Overview
    02:27
  • Web Applications Attack Surface
    05:59
  • Metasploitable VM
    02:33
  • Injection Vulnerabilities
    03:12
  • Broken Authentication Vulnerabilities
    03:35
  • Sensitive Data Exposure Vulnerabilities
    01:56
  • XML External Entities (XXE) Vulnerabilities
    01:20
  • Broken Access Control Vulnerabilities
    01:07
  • Security Misconfiguration Vulnerabilities
    01:31
  • Cross-Site Scripting (XSS) Vulnerabilities
    05:27
  • Insecure Deserialization Vulnerabilities
    00:41
  • Using Components with Known Vulnerabilities
    00:48
  • Insufficient Logging & Monitoring Vulnerabilities
    01:48
  • Additional Risks to Consider
    01:16
  • Discover Vulnerabilities in Websites
    07:56
  • Control Database Server with SQLMap
    08:25
  • Easily Hack a WordPress Site
    06:53
  • Intercept, Analyze, and Replay Web Traffic
    07:39

  • Various Password Attacks
    03:35
  • Hashing in a Nutshell
    05:33
  • Execute an Offline Password Attack on Linux
    06:15
  • Execute an Offline Password Attack on Windows
    05:54
  • Run an Online Password Attack on Linux
    03:23
  • Run an Online Password Attack on a Router
    01:57
  • Crack Passwords with Rainbow Tables
    04:19
  • Design Effective Wordlists
    10:08
  • Password Management Tips
    01:51

  • Attack Vectors
    03:56
  • Open-source Intelligence (OSINT)
    01:31
  • Google Dorks Live Examples
    06:26
  • Track and Spoof Emails Easily
    03:23
  • Collect and Visualize Data with Maltego
    04:47
  • Execute a Phishing Attack
    04:49
  • Hack Facebook, Twitter, and Gmail Accounts
    06:51

Instructor

Mohamad Mahjoub
Cyber Security Expert
Mohamad Mahjoub
  • 4.3 Instructor Rating
  • 1,793 Reviews
  • 70,967 Students
  • 5 Courses

Hi! I’m Mohamad; you might call me a bit of a computer geek; just a bit.

After spending 5 years working as an IT Project Manager for a leading multinational pharmaceutical company, I moved to the Banking sector to attain a senior role in the Information Security Audit field for 4 years; it was such a great experience. I have then relocated to Dubai to join a Dubai Smart Government entity for 3 years as an Information Security Manager. Currently I’m working as an Information Security Consultant for different companies in Dubai, Oman, and Bahrain. I have a total of 15 years of experience in the Information Technology field, with a focus on Information Security.

Since 2012, I have delivered many IT courses and topics to technical and non-technical audience, varying from fresh graduates, IT professionals, senior and executive management, and business owners. In a world of ubiquitous technology, I believe that Information Security is more important than ever, and it is something that everyone should be aware of, therefore it should not only be exclusive to the privileged few. I’m passionate about making this happen through spreading my knowledge to people like you. I’m a certified CISSP, CISA, PMP, ITIL, and ISO 27005 Risk Manager and I have a Masters in Computer Science from the Lebanese American University (LAU).

I hope you will enjoy my course.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.