Kali Linux is the pen-testing professional's main tool, and includes many hundreds of modules for scanning, exploitation, payloads, and post exploitation. In this course you can learn how to use Kali for advanced pentesting, privilege escalation, tunneling and exfiltration, and pivoting.
We will cover the following topics in this course:
Introduction to ethical hacking
Bypass Widnows Security & Anti Virus
Kali Linux installation
Spying on devices
Web app hacking
Cloning Websites and DNS SPOOFING
The attacks demonstrated in this course can cause serious damage and are only shown for educational purposes. The intent of this course is to give you the tools to defend your own networks and help with your development in information security. You are responsible for your own actions!