Kali Linux 101
3.8 (582 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
12,785 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Kali Linux 101 to your Wishlist.

Add to Wishlist

Kali Linux 101

Your guide to getting started with Kali Linux 101 and the exciting world of penetration testing!
3.8 (582 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
12,785 students enrolled
Created by CyberTraining 365
Last updated 12/2016
English
Price: Free
Includes:
  • 1 hour on-demand video
  • 1 Article
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Setting up Kali Linux
  • Managing Services in Kali
  • Configuring Network Adapters in Kali
  • Overview of tools in Kali
View Curriculum
Requirements
  • Download and install VMware virtual machine which will be covered in a lecture
  • Basic Linux command prompts
Description

Kali is a penetration testing Linux distribution created by the Offensive Security. It holds a repository of multiple tools for security related engineers including hacking wireless networks, web applications, databases, Reverse engineering, password crackers, and much more! So as you can see, Kali is a versatile and powerful tool for anyone looking to do any cyber security related work.

As indicated by the ‘101’ in the course title, this course is a beginner’s guide to getting started in Kali…to get your feet wet. The course is broken down into 3 sections; Getting started, Basic Configuration, and Tools overview. We first give you an overview of Kali and its use cases then offer a step-by-step walkthrough of installing Kali using VMware. Next we teach you some important configuration setting in the distribution including configuring your network and managing services in Kali. Knowing these procedures will help you setup the proper environments when using Kali and its tools. Finally we go over the top available in Kali and describe their top features and best use cases.

By the end of this course you will be able to have a fully functioning distribution Kali running on your machine. You will also have an understanding of the Linux environment and how to manage network and system services. Lastly you will have a basic overview of the top tools available in Kali.

Who is the target audience?
  • This course is intended for newbies who are interested in learning more about penetration testing. This course isn't intended for learning advanced Kali tools lessons
Students Who Viewed This Course Also Viewed
Curriculum For This Course
24 Lectures
01:12:19
+
Getting Started with Kali Linux
5 Lectures 15:41

In this lesson we'll introduce you to Kali and it's use cases. By the end of the lecture you will be able to find where to download Kali and the different options you have for running it.

About Kali and use cases
02:22

In this lesson you'll get guided through the Kali install process on VMware.

Installing and configuring Kali on a VMware Virtual Machine
03:23

In this lesson you'll learn important network settings to help you setup the proper penetration testing enviorment.

Configuring the network adapter
03:54

In this lesson we will teach you the first thing to do when you've successfully booted Kali...Change the default password!

Booting Kali for the first time
02:23

In this lesson you'll learn some handy tricks to best work in the VMware and your host enviorment.

Basic commands with Kali and VMware
03:39
+
Configuring Kali Linux
7 Lectures 18:15

In this lesson we'll teach you how to change the host name via the terminal.

Basic Kali Configuration
01:38

In this lesson we'll show you how to request your IP Address.

Configuring your network
01:21

In this lesson you'll learn how to ping your IP address and troubleshoot a DNS Resolution

Requesting and Configuring IP Addresses
03:25

In this lesson you'll learn some of the services that run behind Kali Linux which are Apache, SSH, and MySQL

Managing services in Kali
02:29

In this lesson you'll learn how to manage Apache inside of Kali

Managing Apache in Kali
03:08

In this lesson you'll learn how to manage SSH inside of Kali

Managing SSH in Kali
01:48

In this lesson you'll learn how to manage MySQL inside of Kali.

Managing MySQL in Kali
04:26
+
Tools Overview
10 Lectures 21:53

This lesson introduces you to the various tools inside of Kali and their use cases

Vulnerability Analysis Tools Overview
03:47

This lesson introduces you to the various tools inside of Kali and their use cases

Tools Overview
01:28

This lesson introduces you to the various tools inside of Kali and their use cases

Information Gathering Tools Overview
01:35

This lesson introduces you to the various tools inside of Kali and their use cases

Maltego
02:25

This lesson introduces you to the various tools inside of Kali and their use cases

Web Applications Tools Overview
02:19

This lesson introduces you to the various tools inside of Kali and their use cases

Burp Suite
01:43

This lesson introduces you to the various tools inside of Kali and their use cases

Password Attacks Tools Overview
00:49

This lesson introduces you to the various tools inside of Kali and their use cases

Ophcrack
01:27

This lesson introduces you to the various tools inside of Kali and their use cases

Armitage
02:19

This lesson introduces you to the various tools inside of Kali and their use cases

Top 10 Security Tools Overview
04:01
+
BONUS SECTION
2 Lectures 16:41

Watch how our instructors Timber Wolfe and Bally Kehal crack a WEP based password on a wireless device.

Hacking WEP Wi-fi Passwords
16:22

BONUS **DISCOUNT COUPONS**
00:19
About the Instructor
CyberTraining 365
4.0 Average rating
2,066 Reviews
42,151 Students
16 Courses
Best Selling Instructor, 30,000+ Students

 Join the Cyber Security Industry in 2017!

Interested in starting a career in the Cyber Security Industry? 2017 is the time! 

Learning the fundamentals of Cyber Security provides you with a powerful, and very useful, set of skills. Learn to think like a hacker so you can better defend your networks and data by studying Penetration Testing and Ethical Hacking.   

Jobs in Cyber Security are plentiful. Receiving your Certified Ethical Hacker, Certified Hacker Forensic Investigator, Penetration Tester and Security+ certification will give you a strong background to more easily tackle and pick up more advanced exams, such as the CISSP certification.  

Get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over one million Cyber Security job openings globally. Demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

But, don't take our word for it... take a look at the FREE previews (they are available in all our courses) and see for yourself!

About Us:

CyberTraining 365 is an online academy that offers most in-demand cybersecurity training and certification through different subscription models. Members have access to the ever growing library of quality, engaging videos that are taught by some of industry’s best and most recognized experts.

CyberTraining365 is powered by Social27's patented cloud-based eLearning platform, providing members with an engaging and collaborative learning environment. Through best in class content, social learning tools, and gamification, CyberTraining365 is taking eLearning from Isolation to Collaboration.