Most Advanced Level Ethical Hacking Using Kali Linux
4.1 (238 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
26,361 students enrolled

Most Advanced Level Ethical Hacking Using Kali Linux

Computer Network Penetration Testing Course ,Learn Ethical Hacking Course,Kali Linux Tutorials ,Learn Kali Linux
4.1 (238 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
26,361 students enrolled
Last updated 10/2019
English
English [Auto]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 8 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • History of kali linux
  • Downloading Kali Linux
  • Installing Kali linux
  • Configuring VMware Workstation
  • Updating Kali Linux
  • Managing Services in kali linux
  • Installing vulnerable machine in kali linux
  • Installing nessus
  • Installing cisco password cracker
  • Types of penetration testing
  • Target Scoping Concepts
  • Information gathering Concepts
  • Target discovery Concepts
  • Enumeration Concepts
  • Social Engineering Concepts
  • Vulnerability mappping Concepts
  • Target Exploitation Concepts
  • Privilege escalation Concepts
  • Maintaining Access Concepts
  • dig
  • host
  • dnsenum
  • dnsdict6
  • fierce
  • DMitry
  • Maltego
  • How to gather network routing information
  • Utilize the search engine
  • ping
  • arping
  • fping
  • hping3
  • nping
  • alive6
  • detect-new-ip6
  • passive_discovery6
  • nbtscan
  • OS fingerprinting
  • nmap
  • zenmap
  • SMB enumeration
  • SNMP enumeration
  • VPN enumeration
  • Openvas
  • Cisco Analysis
  • Fuzz Analysis
  • SMB Analysis
  • SNMP Analysis
  • Web Application Analysis
  • Social engineering toolkit
  • MSFConsole
  • MSFCLI
  • Ninja 101 drills
  • Password attack tools
  • Network spoofing tools
  • Network Sniffer
  • Using operating system backdoors
  • Tunneling tools
  • Creating Web Backdoors
  • FTP Server
  • SSH Server
  • Default Gateway
  • Configuring Network Interface Card
  • The Penetration testing lifecycle
  • Deploy metasploitable 2 into vm
Requirements
  • Computer Network Knowledge Recommended
  • Basic IT Management Knowledge Recommended
  • Basic Computer Lan knowledge Recommended
Description

Complete Kali Linux Course - Covered Most Powerful Ethical Hacking Tools To Hack Into The IT System And Secure Them.

This Kali Linux based ethical hacking course covers beginners to advance level ethical hacking topics.This course will give you a perfect skills to work with production environment. Complete network based ethical hacking skills covered. This course will give you a skills to harden security of  IT systems so no one can hack your organization.

This course mainly covers penetration testing frameworks like footprinting target , information gathering ,  network scanning , enumerating target, vulnerability mapping, social engineering, target exploitation, privilege escalation, maintaining access .

This course designed to give real world penetration testing skills. If you are a new in the field of ethical hacking or penetration testing this course will boost your ethical hacking skills and grow your career in IT field.

This course will also give you some basic skills to implement servers and network systems into your organization. Before performing any attack using Kali Linux we teach to configure server first like web server , dns server , iis server , dhcp server so students can build own lab at home to practice this course and can perform safe attack over the systems.

This course covers complete network offensive topics but in safe manner. Penetration tester take permission first before performing any network offensive attack over the system. Penetration tester perform network offensive attack over the systems to gather weakness of it.

Penetration tester perform attack same like hacker but difference is that penetration tester attack on own system to find vulnerabilities and secure them and hacker attack over the target to steal information or down the entire IT system.

This course is encourage you to work as ethical hacker or penetration tester to secure your organization.

Features of this course:-

  • Course will start with lab setup (course will go as zero to hero)

  • We covered basic commands first to work with Linux environment

  • Step by step practicals covered

  • No more theory , try to covered topics with to the point discussion

  • Practical based course

  • Get full support with the course

  • Job oriented topics covered

This course is designed for educational purpose only. We are not motivated to you to launch attacks on internet to damage other. We are giving you a tricks that how attackers attack on our network and how we can defend it by attacking on our own computer networks and devices. We are using our own computer network to perform Ethical hacking that we have full permission to launch attack.

Who this course is for:
  • Anyone who wants to learn kali linux
  • Anyone who wants to learn ethical hacking basic to advance level using kali linux OS
  • Every IT professionals
  • Computer Scientist
  • Network Engineer
  • System Engineer
  • Firewall Administrator
  • Datacenter Specialist
  • IT Security Practitioner
  • IT Trainers
Course content
Expand all 61 lectures 07:50:02
+ Introduction
1 lecture 01:18

In this lecture you will learn about introduction of kali linux operating system.

Preview 01:18
+ Let's start ethical hacking using kali linux
60 lectures 07:48:44

In this lecture you will learn about installation of kali linux into vm.

Preview 07:13

In this lecture you will learn how to install softwares , patches and upgrades into kali linux.

Installing softwares, patches, and upgrades into kali linux
13:48

In this lecture you will learn how to start , stop services in kali linux. In this lecture we discussed about services like http,ssh,mysql.

Configuring services in kali linux
05:58

In this lecture you will learn about kali linux tool's categories.

Categories of kali linux tools
03:38

In this lecture you will learn how to deploy metasploitable 2 into vm.

Deploy Metasploitable2
03:54

In this lecture you will learn about default gateway in computer network.

Default Gateway
01:26

In this lecture you will understand about Name Server in network.

Name Server
02:21

In this lecture you will understand about DHCP.

DHCP
Processing..

In this lecture you will learn to configure network interface card.

Configure Network Interface Card
10:41

In this lecture you will learn how to install ,configure and troubleshoot  ftp server.

FTP Server
11:52

In this lecture you will learn how to configure ssh server.

SSH Server
03:24

In this lecture you will learn about different phases of penetration testing.

The Penetration Testing Life Cycle
06:34

In this lecture you will learn about tarballs theory concepts.

Tarballs
02:55

In this lecture you will learn how to create tarballs.

Creation Of Tarballs
03:36
Extracting Files From A Tarballs
03:02

In this lecture you will learn how to compress tarballs.

Compressing A Tarballs
03:50

In this lecture you will learn about reconnaissance phase.

Reconnaissance Phase
03:38

In this lecture you will learn about reconnaissance process to gather information about target.

Targets Own Websites
02:58

In this lecture you will learn definition of website mirroring.

What is website mirroring?
00:57

In this lecture you will learn to mirror website using HTTRACK tool in kali linux.

Preview 03:08

In this lecture you will learn how to hack information using google.

Google Hacking
06:16

In this lecture you will learn how to gather passwords information and live devices information using GHDB.

Google Hacking Database
04:27

In this lecture you will understand how attacker find confidentials information from job sites.

Job Sites
01:03

In this lecture you will understood how we can dump detais of dns in local kali linux operating system using dig , nslookup and host command. You will also learn to setup dns in windows server 2016.

DNS | Zone Transfer
27:54

In this lecture you will learn how to get information about DNS server and contact information.

Whois
03:57

In this lecture you will learn how we can utilize dnsenum tool to gather target domain records like name servers, hostnames, IP address details etc..

dnsenum
03:18

In this lecture you will use fierce tool to gather information about dns.

fierce
01:54

In this lecture you will learn to use DMitry tool.

DMitry
02:53

In this lecture you will learn to use maltego to gather various information about target.

Maltego
03:55

In this lecture you will learn to trace network routing information using tcptraceroute command in kali linux.

tcptraceroute
03:53

In this lecture you will learn to analysis network information using tctrace.

tctrace
01:27

In this lecture you will learn to gather information about usernames , email addresses , hostnames usinng theharvester command.

theharvester
02:43

In this lecture you will learn to use metagoofil tool to gather information about target.

Metagoofil
04:13

In this lecture you will learn about ping tool in kali linux.

Identifying target machine using ping tool
07:29

In this lecture you will learn to gather information about target machine or device usinng arping.

arping
06:28

In this lecture you will learn to gather target device information using fping command.

fping
04:50

In this lecture you will learn in depth about network scanning process.

Network Scanning Concepts
12:58

In this lecture you will learn how we can scan computer network using hping3 command and footprint target.

hping3
27:46

In this lecture, you will learn about banner grabbing method using kali linux.

Banner Grabing
07:05

In this lecture, you will learn about Nmap.

NMAP
28:53

In this lecture, you will learn about mirroring websites using kali Linux.

Mirroring Website
05:42

Network enumeration using Kali Linux tool.

Netbios Enumeration
09:37

In this lecture, you will learn about SNMP enumeration.

SNMP Enumeration
33:13

In this lecture, you will learn about NTP enumeration using kali Linux.

NTP Enumeration
09:30

In this lecture, you will learn about the LDAP information gathering method.

LDAP Active Directory Part 1
00:49

In this lecture, you will learn about the LDAP information gathering method.

LDAP Active Directory Part 2
14:08

In this lecture you will learn about windows hacking using kali Linux.

Hacking windows using metasploit and post exploitation using meterpreter
21:39

In this lecture, you will learn about exploiting method using kali linux.

Exploiting client side vulnerabilities and take remote control using vnc
05:21

In this lecture you will learn about Escalating Privileges By Exploiting Client-Side Vulnerabilities.

Escalating Privileges By Exploiting Client Side Vulnerabilities Part 1
03:18

In this lecture you will learn about Escalating Privileges By Exploiting Client-Side Vulnerabilities.

Escalating Privileges By Exploiting Client Side Vulnerabilities Part 2
11:09

In this lecture, you will learn how to use kali as a telnet client to perform a man in the middle attack.

Use kali as telnet client and perfrom man in the middle attack using windows.
14:29

In this lecture, you will learn about the yersinia tool in kali Linux.

Yersinia
08:47

In this lecture, you will learn about create trojan in kali Linux and perform the attack using kali Linux.

Creating trojan in kali and perform attack
09:27

In this lecture you will learn about sniff facebook credentials using SET.

Sniff facebook credentials using social engineering tool kit
03:04

In this lecture you will learn about windows hacking using kali linux.

Windows hacking using kali linux
09:46

In this lecture, you will learn about the DoS attack using kali Linux.

DoS Attack using kali linux
08:36

In this lecture, you will learn about hijacking https traffic using kali Linux.

Hijacking HTTPS traffic using kali linux
07:16

In this lecture, you will learn to perform MITM using driftnet and urlsnarf tool in kali Linux.

driftnet and urlsnarf - perform MITM attack
06:28

In this lecture, you will learn to find web app vulnerabilities using kali Linux.

Finding web app vulnerabilities using kali linux
11:18

In this lecture, you will learn about bypassing the windows firewall and maintaining a persistent connection to client using kali Linux.

Bypassing windows firewall and maintaining persistent connection to client
16:52