Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
Thank you to the 41,387 students enrolled in this course! Shouldn't you find out why?
Course Updated 24 November 2016
2 Hours on an Introduction to Perl and How To Use Perl for Writing Ethical Hacking Scripts.
You will also learn How To Create Malware and Use Python to Create Hacking Scripts and an Nmap scanner. Also you will learn Brute Force Cracking Passwords with Python
Nessus Port Scanner and Vulnerability Scanner
Footprinting and Enumeration module
Here are a few 5 star reviews:
"Finally a clear course on Kali!
OMG thank you so much, I finally have a working kali linux installation on my computer!
This course is simply amazingly clear! I`ve never used any other os apart from Windows and Kali always was a mistery to me let alone installing it on my virtual machine. BUT this course solved it, I just followed the instructions and less than 10 minutes later kali is installed and working! The whole course is presented super clear, great video quality and no steps missed!
Cannot recommend it enough!" - TWO 2
firstly i want to thank the lecturer for the great course. and i want to say that the course definitely worth the time." - Berzan Hasan
Fantastic course, lots of content and covers almost everything i need to know as a beginner .Thanks #Nikhil Parekh." - Dr Raihan Kabir
Also, here's a 1 star review:
"Waste of my money
Did not learn anything usefull"
and a 2 star review by William C. Husk Jr who has failed to leave any actual review for me to look at so that I can improve this course.
When you take this course, you are covered by a 30 day full money back guarantee. So there is no waste of money ever if you ask for a refund if this product is not suitable to you. Please look at the number of 5 star reviews before you make a decision on taking my course.
You are about to be introduced to one of the most powerful penetration testing platforms in the world. Kali Linux
Kali Linux is one of the most versatile penetration testing platforms favored by ethical hackers.
This course will introduce you to Kali Linux and explain step by step how to install Kali Linux in a virtual environment on a Windows 10 machine.
You will learn how to install Kali Linux, set up the root username and password, install VirtualBox guest additions, Linux kernels and much more!
All videos are recorded in HD quality and you will be able to follow along as the lessons are spoken in clear English.
You will also be introduced to Nmap and how to use it for security scanning, port scanning and network exploration.
The videos will also guide you on how to install a wireless card within the virtual environment so you can scan wireless networks and devices and take advantage of many of the wireless security tools available in the Kali Linux environment.
You will also learn how hackers use Malware to infect a victim's computer. In addition, you will also be introduced to Python and how to use it for ethical hacking purposes.
Take this course today and start your Ethical Hacking journey now!
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Introduction and Welcome|
|Section 2: Kali Linux Installation|
Downloading Kali Linux
Installing Kali Linux Part 1
Installing Kali Linux Part 2
Final Installation Steps Before Startup
First Look at Kali Linux
Wireless Card Installation Part 1
Linux Kernel Installation
How To Install VIrtualBox Guest Additions For Wireless Card Setup on Kali LinuxPreview
Wireless Card Installation Part 2
|Section 3: NMAP Essentials|
NMAP Introduction and DemoPreview
NMAP Anonymous Mode First
TraceRoute Without ProxyChains
Nmap TCP Port Scanning
Port Scanning on Test Machine
TCP Port Scanning - Further Results
FIN and XMAS Scans
Nmap OS Detection
|Section 4: Introduction To Footprinting|
Fun with List-Urls.py
More of The Harvester
|Section 5: Installing and Working with Nessus|
Introduction to Nessus and Nessus Installation
|Section 6: Web SQL Injection|
Introduction to Web SQL Injection
Impacts of Web SQL Injection
|Section 7: Build Malware in Code Compiler|
Introduction to Malware and TrojansPreview
Installing C / C++ Compiler
Downloading Additional Applications
Creating a Malware Program with Codeblocks
Running Apache Server and Uploading Malware to Server
Using Reverse Shell on Victim's PC
Viewing Access Logs and Introduction to the Metasploit Framerwork
What to Do When Victim is on a Different Network
Using Metasploit to Create an Exploit
Viewing KeyScan Results
|Section 8: Using Python to Create Hacking Scripts|
Python Introduction and Installation on Windows
Python Installation on Kali LinuxPreview
Introduction to PyCharm - Create Your First Program
Importing the Nmap Module
Introduction to Indentation
Basic Commands in Python
Lists, Arrays and Dictionaries
String Manipulation and File Handling
Introduction to FunctionsPreview
Building an Nmap Network Scanner - Part 1
Building an Nmap Network Scanner - Part 2
Creating a Brute Force Password Cracker in Python
Brute Force Cracking Results
|Section 9: How Hackers Create Undetectable Malware and Viruses|
Introduction to Undetectable Malware
Installing Python and Pip
Setting Up The Veil Framework
Installing Gnome Desktop
Wine Mono and Veil-Evasion Installation
Metasploit Installation Complete
Testing MSF Console
Veil Evasion Final Installation
Adding the Metasploit Folder to Veil Installation
Introduction to Veil and The Importance in Ethical Hacking
Creating an Exploit
Testing Exploit on a Windows 10 Machine
Encrypting the Payload
|Section 10: Introduction To Perl and Foundations for Ethical Hacking|
Introduction to Perl
Basic Perl Programming
Introduction to Perl Functions
Working With Arrays
More Fun With Arrays
Conditions in Perl
Switch Statements and More Examples of If Statements
Teaching 46 courses with 70,060 students from 175 countries including United States, United Kingdom, Australia, Morocco, Canada, Poland, India, Egypt, Malaysia and Indonesia
I assist many of my clients, ranging from small/medium businesses to INC 500 corporations to multimillion dollar businesses (and even billion dollar businesses), by guiding them to achieve tremendous growth in revenue and profits utilizing my social media user engagement strategies, mobile applications and proprietary tools.
I am also a sought after best selling author and speaker and have been featured on stages all around the world, responsible for teaching thousands of successful entrepreneurs worldwide
Clients refer to me as a profit strategist - I am an expert at helping my clients with referral marketing using my proprietary Fast Referral System.
In addition, I advise a number of high profile celebrities who have been featured on Miss USA, The Apprentice, Miss Universe, BET, WWE, CNN, ESPN, USA Today, Wall Street Journal, NBC, CBS, Fox, ABC, Entrepreneur Magazine and numerous other television shows and radio stations around the world
Specializing in:- Pay Per Click Marketing (including Analytics)- Digital Startups- Social Media Asset Development and Deployment- Social CRM Technology- Strategic Social Media Marketing Campaign Development- Mobile Application Development- Online Reputation Management- Social Community Development, Management and Engagement- Social Brand Management- Social Media Strategy and Planning- Online Community Management and Engagement including in depth social conversation monitoring- Facebook, Twitter and LinkedIn Application Development