Start Kali Linux, Ethical Hacking and Penetration Testing!
4.1 (3,203 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
63,939 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Start Kali Linux, Ethical Hacking and Penetration Testing! to your Wishlist.

Add to Wishlist

Start Kali Linux, Ethical Hacking and Penetration Testing!

Learn the basics of ethical hacking, penetration testing, web testing and wifi hacking in kali linux!
4.1 (3,203 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
63,939 students enrolled
Created by Ermin Kreponic
Last updated 4/2016
English
Price: Free
Includes:
  • 4 hours on-demand video
  • 1 Supplemental Resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Step by step instructions for insulation VirtualBox and creating your virtual environment on Windows, Mac, and Linux.
  • An introduction to attacking networks and breaking passwords.
  • Tips for remaining anonymous in hacking and penetration testing activities.
  • A clear understanding of what ethical hacking and penetration testing is.
View Curriculum
Requirements
  • Reliable and fast internet connection.
  • Wireless networking card.
Description

You will get to see screen capture live tutorials showing you everything you need to do to get started with ethical hacking and penetration testing including information about all of the topics below!

Learn the basics of what ethical hacking and penetration testing is to decide whether you want to go to an advanced level! Get a full tutorial on how to install VirtualBox o including on Windows 8.1 and gain the ability to run Kali Linux in any environment. See what to do to create the virtual environment and learn the basics of the Linux terminal.

Continue through the course to learn how to stay anonymous with tor and use Virtual Private Networks (VPN). Follow this information with an introduction to the ethical hacking and penetration testing tools you can use to take your learning from beginner to advanced! See how to change a mac address with macchanger. Discover how to use aircrack for wifi hacking, learn about proxychains, and finish with denial of service attacks.

Take this course now to get your learning started fast as an IT security professional online!

Who is the target audience?
  • You can begin this course with any level of knowledge and quickly start advancing your skills as an information technology and security expert anywhere in the world!
Students Who Viewed This Course Also Viewed
Curriculum For This Course
22 Lectures
04:12:31
+
Introduction to Ethical Hacking and Penetration Testing.
5 Lectures 48:56
Ethical hacking and penetration testing. What is it and how can you use it?
08:02

Prerequisites for this course.
07:28

Basic terminology such as white hat, grey hat, and black hat hacking.
12:00

Basic terminology including SQL injections, VPN , proxy, VPS, and key loggers.
18:18

How to get the most out of this course and practice what you learn.
03:08
+
Creating your hacking environment with VirtualBox and Kali Linux.
4 Lectures 52:14

Know exactly from the beginning the three most important points already made in the course!

Three key ideas for success using this course.
3 questions

Installing VirtualBox with rpm plus why use a virtual machine.
08:58

Installing VirtualBox using the default package manager from repositories.
15:01

Creating the virtual environment.
13:35

Installing VirtualBox Guest Additions
14:40
+
Linux Terminal including basic functionalities and CLI.
3 Lectures 39:01
Introduction to the Linux terminal.
09:31

Linux Command-Line Interface (CLI) basics.
14:04

The Linux CLI explained in greater detail to give you a good understanding.
15:26
+
Getting started using ethical hacking and penetration testing.
9 Lectures 01:51:20
Tor part 1.
10:58

Proxychains part 1.
12:01

VPN part 1.
06:08

Macchanger part 1.
12:23

Nmap part 1.
17:34

Intro to wifi hacker cracking WPA⁄WPA2.
15:14

Aircrack and reaver installation.
12:44

Aircrack-ng crunch usage example 1.
11:04

Performing denial of service on wireless networks part 1.
13:14
+
Get the full course for answers to your questions + 23 hours of HD video!
1 Lecture 00:00
Bonus Lecture: Take the full hacking course for 50% off using this coupon!
1 page
About the Instructor
Ermin Kreponic
4.3 Average rating
20,622 Reviews
277,475 Students
13 Courses
IT Expert

Strongly motivated young IT expert, Linux enthusiast with a passion for troubleshooting network related problems. With an exceptional eye for details and a sense of urgency when it comes down to problem solving.

Skills
- Advanced knowledge of Linux command line
- Installation, configuration and maintenance of servers that run under Unix/Linux type
operating systems
To name a few: DNS, TFTP, FTP, SSH, APACHE, SMTP, VSFTP and some others
- Troubleshooting a wide range of network related problems. Meaning, digging deep for
packets on any given network.
Using one of my favourite tools for capturing and filtering packets on the network, Wireshark,
and resolving end-user issues
- Good understanding of Cisco routers and IOS operating system
- Configuration and implementation of Linux firewall namely Iptables
- Supervision and filtration of network traffic
- Tightening down security and pen testing networks for possible vulnerabilities
- Good knowledge of network gear brands and their strengths or weaknesses
- Preforming system back up
- Fair knowledge of Bash scripting
- equipment installation, upgrades, patches, and configuration.


Personal note:

I do not sleep much, but that is not only because I work hard, rather instead it is
because I enjoy this line of work,
it is extremely rewarding in every way that matters