Kali Linux - Backtrack Evolved
4.4 (30 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
724 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Kali Linux - Backtrack Evolved to your Wishlist.

Add to Wishlist

Kali Linux - Backtrack Evolved

Assuring Security by Penetration Testing
4.4 (30 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
724 students enrolled
Last updated 9/2014
English
Current price: $10 Original price: $85 Discount: 88% off
1 day left at this price!
30-Day Money-Back Guarantee
Includes:
  • 2.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Have a coupon?
What Will I Learn?
Many advanced techniques are addressed within this series, but it is still designed to simultaneously accommodate less experienced viewers. The series provides detailed explanations intended to clearly address the underlying processes involved with all tasks performed.
View Curriculum
Requirements
  • Basic understanding of Linux and TCP/IP will be helpful in understanding the content, it is not essential.
Description

Kali Linux is the latest Linux distribution from Offensive Security, custom-built for the distinct purposes of performing network security audits and forensic investigations. Kali comes fully loaded with hundreds of integrated tools to perform every aspect of a penetration test.

Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide helps you to develop practical and useful professional skills in the information security industry, while simultaneously delivering the high level of excitement and exhilaration that goes hand-in-hand with the world of computer and network hacking.

Cyber-crime is on the rise and information security is becoming more paramount than ever before. A single attack on a company’s network infrastructure can often result in irreparable damage to a company’s assets and/or reputation.

It is no longer sufficient to merely rely on traditional security measures. In order to ensure the security of critical information assets, it is essential to become familiar with the strategies, tactics, and techniques that are used by actual hackers who seek to compromise your network.

Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide will prepare you to enter the world of professional hacking by ensuring that you are well versed with the skills needed and tools used to compromise the security of enterprise networks and information systems.

About the Author

Justin Hutchens currently works as a security consultant and regularly performs penetration tests and security assessments for a wide range of clients. He previously served in the United States Air Force where he worked as an intrusion detection specialist, network vulnerability analyst and malware forensic investigator for a large enterprise network with over 55,000 networked systems. He currently holds a Bachelor’s degree in Information Technology and multiple professional information security certifications, to include CISSP (Certified Information Systems Security Professional), OSCP (Offensive Security Certified Professional), eWPT (eLearnSecurity Web-Application Penetration Tester), GCIH (GIAC Certified Incident Handler), CNDA (Certified Network Defense Architect), CEH (Certified Ethical Hacker), ECSA (EC-Council Certified Security Analyst) and CHFI (Computer Hacking Forensic Investigator).

Who is the target audience?
  • Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide is a great choice for anybody interested in information security, penetration testing or ethical hacking. While a basic understanding of Linux and TCP/IP will be helpful in understanding the content, it is not essential.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 40 Lectures Collapse All 40 Lectures 02:43:30
+
Lab Preparation
5 Lectures 16:08

Must have multiple virtual machines for a test lab / acquire images from multiple locations

Developing a Network Environment
02:17

Must manage network operating systems in a singe virtual environment / install the VirtualBox virtualization software

How to Install Oracle VirtualBox
03:02

Must manage the network operating systems in a singe virtual environment / install the VMware virtualization software

How to Install VMware Player
03:06

Need a Kali Linux virtual machine for performing penetration tests / install Backtrack 5

How to Install Kali Linux
03:52

Must have vulnerable systems to perform penetration testing techniques / modify security policies on network systems to increase vulnerabilities

Increasing Network Attack Surface
03:51
+
Information Gathering and Reconnaissance
5 Lectures 18:59

Information gathering / use public resources and websites

Passive Reconnaissance
04:11

Information gathering / use uniquely crafted Google queries

Google Hacking
04:25

Use a series of Google queries to enumerate target subdomains

Subdomain Enumeration with Google Hacking
03:40

Information gathering / automated command-line tools (Dmitry & Goofile)

Reconnaissance Tools (Dmitry & Goofile)
03:12

Information gathering / an all-in-one translation tool (Maltego)

Preview 03:31
+
Target Discovery
5 Lectures 21:05

Network discovery / discover hosts on the local network at layer 2

Layer 2 Discovery
03:42

Network discovery / discover remote hosts at layer 3

Layer 3 Discovery
05:22

Network discovery / use nmap utilities

Host Discovery with nmap
04:36

Custom discovery scans / Scapy for scan scripting

Preview 04:30

Operating system identification / automated tools (p0f, xprobe2, and nmap)

Fingerprinting Operating Systems
02:55
+
Scanning and Enumeration
5 Lectures 20:24

Port enumeration / the nmap command-line tool

Scanning with nmap
03:22

Port enumeration / Zenmap graphical interface

Scanning with Zenmap
04:32

Automate nmap related tasks / use Nmap Scripting Engine and scriptable outputs

Nmap Scripting
04:53

Stealth scanning without risk of detection / zombie scanning with an idle host

Zombie Scanning
03:35

Verify services running on open ports / Netcat, Dmitry, and Amap

Service Identification
04:02
+
Vulnerability Mapping
5 Lectures 19:31

Identify unique vulnerabilities / use Metasploit auxiliary modules

Metasploit Auxilliary Scans
03:13

Identify vulnerabilities / install Nessus vulnerability scanner

Installing Nessus
04:40

Identify vulnerabilities / perform scans with Nessus

Nessus Scanning
04:03

Focus on vulnerability discovery / modify and create scan policies

Nessus Policies
03:40

Gather vulnerability information / review Nessus scan results

Nessus Result Analysis
03:55
+
Exploitation with Metasploit
5 Lectures 19:46

Automated tool to launch exploits against remote systems / use the Metasploit framework

Metasploit Framework
04:45

Launch exploit with Meterpreter payload / navigate payload to further compromise the system

Meterpreter Basics
04:14

Launch exploit with Meterpreter payload / perform advanced exploitation techniques

Meterpreter - Advanced Exploitation
03:45

Automated exploitation platform / install Metasploit Pro in Kali Linux

Installing Metasploit Pro
02:07

Automated exploitation platform / use Metasploit Pro to perform discovery, vulnerability mapping, and exploitation

Preview 04:55
+
Hands-on Exploitation
5 Lectures 27:28

Exploit target systems / use proof-of-concept scripts in the exploit database

Preview 05:29

Social engineering attack / use credential harvester to gather the victim's credentials

Social Engineering Toolkit - Credential Harvester
05:11

Exploit web services / Burp Suite Intruder function

Burp Suite Intruder
05:22

Learn web application attacks / use DVWA for testing

Web Application Exploitation
06:01

Maintain access to the exploited system / use Netcat and Meterpreter backdoors

Preview 05:25
+
Privilege Escalation
5 Lectures 20:09

Man-in-the-middle attack / use the ettercap graphic interface

Ettercap
04:11

Unknown hash value / use Hash-ID to identify and then Find-My-Hash to crack a password hash

Hash Identifier / Find-My-Hash
03:39

Acquire network service credentials / use Hydra to attack a service

Hydra
03:58

Acquire Linux and/or Windows password hashes / use John the Ripper to crack

John the Ripper
04:11

Graphical interface for password attacks / use Johnny or xHydra

Johnny / xHydra
04:10
About the Instructor
Packt Publishing
3.9 Average rating
4,043 Reviews
32,408 Students
318 Courses
Tech Knowledge in Motion

Packt has been committed to developer learning since 2004. A lot has changed in software since then - but Packt has remained responsive to these changes, continuing to look forward at the trends and tools defining the way we work and live. And how to put them to work.

With an extensive library of content - more than 4000 books and video courses -Packt's mission is to help developers stay relevant in a rapidly changing world. From new web frameworks and programming languages, to cutting edge data analytics, and DevOps, Packt takes software professionals in every field to what's important to them now.

From skills that will help you to develop and future proof your career to immediate solutions to every day tech challenges, Packt is a go-to resource to make you a better, smarter developer.

Packt Udemy courses continue this tradition, bringing you comprehensive yet concise video courses straight from the experts.