Kali Linux Hacking Lab for Beginners

Learn to hack with Kali Linux! Easily create your own hacking labs and do penetration testing!
4.5 (183 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
8,717 students enrolled
$45
Take This Course
  • Lectures 18
  • Length 1.5 hours
  • Skill Level Beginner Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 1/2017 English

Course Description

Learn the basics of Ethical Hacking with Kali Linux.

The goal of this course is to help you learn the basic fundamentals of hacking and to give you an introduction to becoming an ethical hacker. This course targets students who have little or no experience in hacking or penetration testing.

In this course you will not only learn the theory behind hacking but you will also learn the practical side of ethical hacking.  You will learn how to set up your own virtual lab environment just like the one used in this course.  You will be able to follow the step you see in the lecture and replicate them in your own lab in environment.  This course also has PDFs for each of the lectures to help you follow along.

Also the software you will need for this course is free.  If you are looking to get a good foundation in ethical hacking with Kali Linux enroll today and get started!

What are the requirements?

  • A computer with at least 4GB of RAM
  • Internet Connection
  • Basic Network Understanding (IP addresses, PING)

What am I going to get from this course?

  • Understand basic principals of ethical hacking
  • How to use NMAP
  • Understand Footprinting
  • Hacking with WireShark
  • Build your own Hacking Lab

Who is the target audience?

  • Anyone who is interested in Kali Linux Hacking
  • Anyone interested in Ethical Hacking

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Course Introduction
02:10

Welcome to the course! Check out this lecture to learn about your two instructors (Paul Hill and Jayson G) and the course goals.

04:14

Before you understand what ethical hacking is, let’s learn what hacking is. According to cyber.laws.com, “computer hacking refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator's original objective.”

01:11

This text-based lecture lists the hacking terms that you should be familiar with and explains what they mean. Take a moment to read over it so you will understand what these terms mean in future lectures.

Section 2: Creating Your Virtual Hacking Lab
03:08

In this lecture you are going to learn what Virtual Machine is and how it can be used to help you learn how to hack!

02:22

VirtualBox is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL) version 2.  For more information, visit https://www.VirtualBox.org/wiki/VirtualBox.

04:03

Kali Linux is a Linux distribution which includes tools designed specifically for the penetration testing or
digital forensics of a system or a network. It is open source which means anyone can legally download
and use it for free. It includes tools for every ethical hacking need ranging from passive intelligence
gathering all the way to active attacks that can be carried out on a target network or system.

Offensive Security offers a virtual image for download especially designed for VirtualBox. Downloading
the image instead of the installation file allows us to entirely skip the operating system installation and
just power on the virtual machine for immediate use.

06:38

In this lecture you will learn how to work efficiently with the Kali Linux Operating System.  We will cover the layout of the Graphical User Interface (GUI), how to manage and use workspaces, how to find and launch applications, how to customize your operating system, how to create user accounts with the GUI, change or disable the automatic screen lock setting, and more.

11:46

The terminal is a command line system similar to Windows Command Prompt. You can complete many actions from the terminal and is often faster than the user interface. It does how take quite a bit of practice in order to memorize all the different commands you will want to use, but with Google at your side, you will have no issues working in the terminal.


To launch the terminal, you can right-click on the desktop and choose “open Terminal”. Alternatively, you may select Applications in the top left, and then choose “Terminal”.

05:52

A VirtualBox Host-Only network allows our Kali Linux VM to communicate with its host computer (the computer you use to run the VM) and any other VMs attached to the same Host-Only network. In this lecture we are going to create a Host-Only network and configure our Kali Linux VM to use it.

Section 3: Introduction to Footprinting
03:14

Footprinting is the process of gathering data about a certain target, usually for the purpose of exploiting that information to compromise the target. Some of the information collected might be IP ranges, system naming convention, software, open ports, services running and user account names. This information can vary depending on the type of attack.

04:50

NMAP (Network Mapper) is an open source tool used for things such as network discovery, auditing and port scanning.  It is compatible with both Windows and UNIX and even has an optional GUI that can be used.

NMAP is a very useful tool in the reconnaissance process but it can be very useful for both offensive and defensive security.   There are many different types of scan you can run with NMAP.  To display some the basic uses you can type “nmap’ in a terminal window.   This will show the basic commands associated with NMAP.

Section 4: Wireshark Hacking Lab
10:37

In this lecture you are going to download and import two virtual machines; a FTP server VM and an FTP client VM. Once we download the VMs we will connect them to our VirtualBox Host-Only network and make sure we can communicate between our client / server VM and that our Kali Linux VM can communicate with the FTP server.

04:15

Now you are going to use Wireshark to capture packets that are being sent over the network. Once we begin capturing all the packets being sent over the network we are going to initiate an FTP connection between our FTP server and FTP client. Once that is done we will stop the Wireshark capture and analyze the packets to see if we captured the username and password that was sent over the network.

06:28

In this lecture you are going to learn how you can use WireShark to capture files that are sent over the network via FTP.

Section 5: Wordpress Website Hacking Lab
05:48

In this lecture you are going to setup your personal Wordpress Hacking Lab with a special prebuilt VirtualBox Image made just for this course!

12:31

In this lecture you are going to learn how to footprint a Wordpress Website using the various tools available to you with Kali Linux.

08:27

In this lecture I am going to show you how you cannot brute force a WordPress website.

Section 6: Course Conclusion
Bonus Lecture
06:09

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Paul Hill, Expert IT Instructor: 37k+ Students, 2.5k Reviews, 9 Courses

Paul is an IT Professional with over 8 years of experience currently working as a Network Administrator in contract support of various Federal Agencies in the United States.

Paul began his career by volunteering his computer skills at his local church at the age of 16. He identified a technology problem the church was having and designed a system to fix it . Other IT Professionals at the church encouraged Paul to continue utilizing his skills to gain experience, and emphasized that he should include it on his resume even though his experience wasn't paid.  Based solely on the experience he gained volunteering, a large DoD contracting company hired Paul as an intern.   As his career progressed, Paul moved on to another Large company to work full time.

Paul constantly pushes himself to increase the depth of his knowledge in the field of Information Technology and expand his skill-set, whether on the job or at home. Paul gratefully notes that he “had the blessing of working alongside highly motivated and talented professionals” who continually inspired and pushed him to take challenges head-on, and to make EVERYTHING you can out of opportunities that arise while on the job. His motto is "Any job is what you make of it. You write your own resume and paycheck by your drive to succeed."

Paul's goal on Udemy is to help YOU get an IT job by providing you a basic skill-set. The fact is that most entry level IT jobs (Help Desk) in the NCR are paying only 10k under the median HOUSE HOLD income from just ONE entry level job and a much higher potential to double or triple the median house hold income throughout one's career. The IT field is viewed as very difficult to enter, but if you have a good skill-set and determination to succeed, you WILL get hired!

Instructor Biography

Jayson is an IT professional with more than 8 years of IT experience.  He is currently working as a Systems Administrator and as a Security Specialist.  In his current role, he handles functions such as installing endpoint security tools and running vulnerability scans.

Jayson got his start in IT working on 24/7 help desks for large companies.  His first IT job was on a help desk that fielded calls for everything from servers and computers to the AC being too cold.  He then moved on to a help desk where he was required to work nights, weekends and holidays.  This inspired him to go back to school and start to pursue career certifications.  He was able to find a desktop position with another company and immediately started towards his bachelors and achieved several certifications.  This allowed him to quickly move into a Systems/Network Administration role.

Jayson currently holds an Associates Degree in Network Administration, a Bachelors in Information Security, and a CISSP, CeH, Security+ and several other certifications.

Jayson has persevered and to put in a lot of hard work using his personal time to accomplish his goals up to this point.  If you take the same approach with your learning, your career will eventually reap the benefits.

Ready to start learning?
Take This Course