Learn Hacking using Backtrack 5
3.3 (6 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
252 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Learn Hacking using Backtrack 5 to your Wishlist.

Add to Wishlist

Learn Hacking using Backtrack 5

Social Engineering, Metasploit, Nmap and Much More
3.3 (6 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
252 students enrolled
Last updated 8/2014
English
Current price: $10 Original price: $20 Discount: 50% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 2.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Learn Backtrack
  • Learn Nmap
  • Learn Metasploit
View Curriculum
Requirements
  • Internet
  • A computer which you can format and experiment with
Description

Welcome to "Learn Hacking using Backtrack 5". This is a course dedicated to learning the backtrack 5 Linux OS along with many of the tools it comes with. Please note that everything on this course is purely educational and we are not responsible for your actions.

  • Backtrack Basics: New to Backtrack? What to learn how to get started and learn the basics of hacking? Then this is where you want to start! These videos include how to install backtrack, updating tools, and the protocol to take when taking over a system.
  • Backtrack Intermediate: For those who want more than the basics. Includes web-based exploitation and the use of backdoors.
  • Backtrack wireless: That magical piece of technology that gives you access over the air-waves and its vulnerabilities.:
  • Metasploit is an amazing framework for exploits and updates almost everyday. These videos cover some of the things Metasploit can do, and how to use it.
  • Tutorials on learning to code your own exploits and other useful things for penetration testing.
Who is the target audience?
  • Hackers
  • Web Developers
Students Who Viewed This Course Also Viewed
Curriculum For This Course
27 Lectures
02:35:36
+
Introduction
2 Lectures 02:50
+
Getting Started
5 Lectures 23:10


Installing Backtrack - II
01:51

Installing Backtrack - III
03:23

Updating and Getting Familiar with Backtrack commands
05:02
+
Hacking Wireless Devices with Backtrack
5 Lectures 37:30
Hacking Wifi with Backtrack - I
03:20

Hacking Wifi with Backtrack - II
08:31

Hacking Wifi with Backtrack - III
09:11

Hacking Wifi with Backtrack - IV
07:43

Wifi Adapter Transmission Power
08:45
+
Metasploit Framework
4 Lectures 40:27
metasploit Frame
07:11

Hacking with Metasploit Framework - I
11:37

Hacking with Metasploit Framework - II
10:47

Armitage
10:52
+
Scanning
2 Lectures 12:16
Introduction to Nmap
01:47

Nmap Commands
10:29
+
Social Engineering
1 Lecture 10:05
Social Engineering attack via Backtrack
10:05
+
Scanning and Hacking websites via Backtrack
1 Lecture 12:32
Scanning and Hacking websites via Backtrack
12:32
+
Tools of Backtrack used in Hacking
6 Lectures 15:32
Ettercap for MITM
03:20

Hydra for Password Cracking
03:07

Burp Suite
02:39

Hping 3
01:35

Wireshark
03:21

Detecting Rootkits
01:30
+
Conclusion
1 Lecture 01:14
Conclusion
01:14
About the Instructor
QScutter Tutorials
3.0 Average rating
611 Reviews
7,288 Students
40 Courses
a place to learn technology

QScutter is a Indian based company that offers an ever growing range of high quality eLearning solutions that teach using studio quality narrated videos backed-up with practical hands-on examples. The emphasis is on teaching real life skills that are essential in today's commercial environment. We provide tutorials for almost all IT topics.