Fundamentals of Kail Linux
4.0 (32 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,831 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Fundamentals of Kail Linux to your Wishlist.

Add to Wishlist

Fundamentals of Kail Linux

Explore Kali Linux as you learn the fundamentals
4.0 (32 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,831 students enrolled
Created by Real Security
Last updated 7/2017
English
Current price: $10 Original price: $20 Discount: 50% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 2.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Learn How to use Kali Linux
  • Understand basic principals of ethical hacking
  • Setting up a virtual lab
  • Installing virtual machines and appliances
  • Overview of the tools and explore the applications in Kali Linux
View Curriculum
Requirements
  • Understand basic computer networking concepts
Description

Kali Linux is an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.

In this course we'll explore how we can use Kali Linux to test systems for weaknesses. We'll look at how to establish a virtual network of systems to use as a learning environment for Kali. And we'll look at the Kali system and we'll demonstrate some of the tools provided by Kali for testing system. 

We'll first start by taking a look at Oracle's VirtualBox environment. And then we get into building a network of testing target. We'lll then describe to Kali operating system in this extensive set of tools for information gathering and system testing.

When you finish this course, you'll have a great understanding of how to set up a virtual test network, and use it to test systems for vulnerabilities.

Who is the target audience?
  • Anyone who want to learn Kali Linux
  • Anyone who want to learn Ethical Hacking
Students Who Viewed This Course Also Viewed
Curriculum For This Course
31 Lectures
02:28:17
+
Introduction
2 Lectures 02:31
+
Virtual Lab Setup
6 Lectures 36:17


Installing virtual machines
08:11

Installing appliances
07:34

Getting Metasploitable and Windows VMs
04:34

Working with advanced configuration in VirtualBox
03:04
+
Exploring Kali
4 Lectures 15:17
Exploring the quick access list
08:04

Settings pane
01:53

Exploring the applications in Kali
03:31

Updating Kali
01:49
+
Information Gathering
3 Lectures 13:34
Reviewing the tools
01:04

Introducing DMitry and DNSenum
05:33

Introducing Maltego
06:57
+
Vulnerability Analysis
5 Lectures 27:21
Tools
01:56

Install and Run OpenVAS
09:13

Custom scan with OpenVAS
01:22

Explore the OpenVAS menu
05:00

Vega
09:50
+
Passwords and Hashes
6 Lectures 25:39
Password Testing
03:17

Use command-line tools
03:18

Windows Credential Editor
03:15

Using John the Ripper in Linux
08:12

Pass the hash
03:58

Use Rainbow Tables
03:39
+
Exploitation
5 Lectures 27:38
Exploitation tools
07:02

Creating Trojans with msfvenom
04:33

Exploiting with Armitage
06:17

Pivot through a network
05:51

Getting stealth and persistent access
03:55
About the Instructor
Real Security
4.0 Average rating
32 Reviews
1,831 Students
1 Course
Cyber Security Experts

We help secure networks, applications, people and facilities enabling you to reduce risk and grow. The best defense is a good offense. Test the effectiveness of your own security controls before hackers do it for you. We are a full-service information security management company that protects sensitive, confidential business information from unauthorized access, disclosure, distribution and destruction.