Ethical Hacking using Kali Linux from A to Z
4.4 (272 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
2,605 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Ethical Hacking using Kali Linux from A to Z to your Wishlist.

Add to Wishlist

Ethical Hacking using Kali Linux from A to Z

Learn Ethical Hacking using Kali from Scratch
Best Seller
4.4 (272 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
2,605 students enrolled
Created by Mohamed Atef
Last updated 8/2017
English
Current price: $10 Original price: $150 Discount: 93% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 8.5 hours on-demand video
  • 1 Article
  • 2 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Plan for a Full Ethical Hacking
  • Learn How to use Kali Linux as your main Hacking tool
  • Gather deep Information about your victim
  • Realistic password attacks
  • Realistic SQL Injection
  • Network Hacking
  • Working with Vulnerability and Exploit
  • Social Engineering attacks
View Curriculum
Requirements
  • Basic Computer Knowledge
  • Basic Network Knowledge
  • PC with 4 GB RAM and 25 GB Free disk space
  • Free VMWARE Player
  • Passion to learn Ethical Hacking
Description

The course designed for anyone who want to learn Ethical Hacking from scratch using Kali Linux and moving to the world of professional penetration testing.

The course introduces students to the latest ethical hacking tools and techniques, including a teasing lab for practicing different attacks. Students will simulates a full penetration test from A to Z.

Ethical Hacking using Kali from A to Z is a realistic security course, . This advanced penetration testing course requires practice, testing, and the ability to want to learn in a manner that will grow your career in the information security field.

Enrolled students will receive every month a virtual machine or remote lab access or a link to a local web application as a challenge and will be requested to try to hack it, this will keep them involve in Ethical Hacking until they reach a stage where they can do that in a real environment.


Who is the target audience?
  • Anyone who want to learn Ethical Hacking
  • Security Administrator
  • Network Administrator
  • Computer Science Students
  • You
Compare to Other Ethical Hacking Courses
Curriculum For This Course
81 Lectures
08:18:28
+
Introduction
1 Lecture 11:31

An Introduction about the course where the following points will be covered. 

Course Objective

Course Outline

Why this course is different ?

Continuous learning  

Additional Resources

Certification

Support


Preview 11:31
+
Setup Your Lab
4 Lectures 22:23

In This lecture you will learn how to build your Hacking lab to practice all the course attacks. 

Build your lab
03:58

Course Lab files
00:16

In this lecture i will explain how to setup your lab to be ready to start the course. 

Setup up your Virtual Machines, Lab file
14:30

In this lecture i will explain how to setup your work space to be able to practice all the attacks.

Setting your Workspace
03:39
+
Getting Comfortable with Kali Linux
5 Lectures 28:03

Introduction about Ethical Hacking and Penetration testing and its importance and the skills the Ethical hacker need to have to be able to preform a professional penetration testing 

Penetration Testing Phases
04:51

What is Kali Linux and why its different from any Linux distribution and why any Ethical Hacker need to be very familiar with Kali Linux.

Kali Linux
08:18

Find your way around Kali and Linux and get comfortable using it, even if you are new to Linux platform, you will get to learn how to use it from scratch. 

Finding Your Way Around Kali
04:41

When you setup Kali Linux for the first time you will need to update/upgrade all its Hacking program, in this lecture you will learn how to do this. 

Update / Upgrade Kali Packages
03:38

Different ways to search for a files or a program in Kali Linux. 

Find, Locate
06:35
+
Managing Kali Linux Services
2 Lectures 07:29

In this lecture you will learn what is SSH service and how to use it in Kali Linux.

SSH Service
03:30

In this lecture you will learn what is HTTP service and how to use it in Kali Linux.

HTTP Service
03:59
+
Essential Tools
7 Lectures 32:33
Netcat
07:55

Grabbing Banner
02:19

Transferring Files with Netcat
04:55

Remote Administration using Netcat
02:42

WireShark
04:41

Analysis WireShark traffic in a simple way
05:51

Another WireShark Example
04:10
+
Passive Information Gathering
10 Lectures 01:01:25

In this lecture, i explained what is the passive information and its importance of this process in penetration testing. 

Passive Information Gathering
05:35

In this lecture i explained some easy technique to get very critical information. 

Easy Way to get crtical information
05:54

Get more passive information about your target. 

Passive Information 1
11:28

Different technique to gather personnel information about your victim, you will not believe the amount of personnel information available online about anyone including yourself. 

Gathering Personal Information
07:34

An amazing intelligence tools to gather passive information called Maltego. 

Maltego (Intelligence Recon Tool )
01:48

How to use Maltego to gather passive information about your victim. 

Using Maltego
08:09

How to use Maltego to gather passive information about your victim.

Related Entities in Maltego
03:47

How to use Maltego to gather passive information about your victim.

More Maltego
06:01

Google is an excellent tool to gather information about your victim if you know how to use the right search keyword and dorks. 

Google Hacking
06:54

Learn how to use google operator to get critical information.

Google Search Operator
04:15
+
Active Information Gathering
10 Lectures 53:29

The Best scanning tools to gather active information about your victim

NMAP
10:15

How to sweep the network. 

Sweeping the Network
04:10

Get more active details about your victim. 

Get more details about the victim
07:11

Learn how to use additional scripts in nmap

NMAP NSE Scripts
01:35

Use the GUI  of NMAP which is ZNMAP

NMAP GUI (Zenmap)
05:39

How to use SMB to get information about your victim.

SMB Enumeration
06:14

SMB Null Session
06:48

What is the DNS Service and how to enumerate it. 

DNS Enumeration
02:22

How to preform a DNS Zone transfer 

DNS Zone Transfer
06:14

An excellent tools for Enumeration/

Enum4Linux
03:01
+
Password Attacks
9 Lectures 48:39

An Introduction to the effective password attacks

Password Attacks
05:59

An excellent tools for cracking password and how it can crack both plan test and encrypted online password 

XHydra
07:28

An example of SSH can be easily cracked

Cracking SSH
03:24

An excellent tool on how Windows Remote Desktop can be cracked easily and full access can be granted. 

Ncrack
08:40

An excellent tool on how Windows Remote Desktop can be cracked easily and full access can be granted.

Ncrack Different OS
04:02

Wordlist is very important when it come to the password attack , in this lecture you will learn how to get the right and effective wordlist 

Use The Right Wordlist
04:28

An Excellent tools to build an effective wordlist

Crunch
05:59

The most effective wordlist 

The Most amazing and effective Wordlist
06:18

One final word about Password attack
02:21
+
Web Application Attacks
6 Lectures 44:04

SQL Injection is one of the most common attack, very effective and very easy to do. 

Preview 02:23

What is SQL Injection in the first place. 

Whats is the SQL Injection ?
09:48

Build your own lab to test SQL Injection attacks. 

Setup your Web Application lab
09:50

Is the site infected with SQLI ?
04:42

Amazing Kali Linux tools for SQL injection attack. 

The amazing SQLMAP
10:22

Live SQL Injection example. 

Live Example
06:59
+
Network Attacks
8 Lectures 01:03:16

Introduction about Network attacks. 

Introduction to Network Attacks
09:28

Before starting any Network attack using Kali Linux you need to enable routing on your Kali box. 

Enable Routing
03:32

How to do a MITM attack. 

MITM attack using Ettercap and Xplico
08:08

Amazing tool that allow you to capture the traffic and rebuild the packet. 

Start Xplico
01:41

A full attack using Ettercap and Xplico

Ettercap and Xplico attack
09:29

A full attack using Wireshark and Xplico

WireShark and Xplico
10:00

DNS Spoofing

DNS Spoofing
10:56

DNS Spoofing attack

DNS Spoofing Attack
10:02
3 More Sections
About the Instructor
Mohamed Atef
4.4 Average rating
2,634 Reviews
20,212 Students
14 Courses
Information Security Consultant, Certified Instructor

Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience.

CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+

Professional Experience:
IBM, Cliveland Clink Abu Dhabi (CCAD), Orascom Telecommunication, UAE Ministry of Interior, Egyptian Ministry of Interior, Saudi Ministry of Interior, Prince Naif University for forensic science - KSA, Khalifa University - UAE, Cairo University - Egypt