Ethical Hacking using Kali Linux from A to Z Course

The course designed for anyone who want to learn Ethical Hacking from scratch using Kali Linux and moving to the world of professional penetration testing. The course introduces students to the latest ethical hacking tools and techniques, including a teasing lab for practicing different attacks. Students will simulates a full penetration test from A to […]

The course designed for anyone who want to learn Ethical Hacking from scratch using Kali Linux and moving to the world of professional penetration testing.

The course introduces students to the latest ethical hacking tools and techniques, including a teasing lab for practicing different attacks. Students will simulates a full penetration test from A to Z.

Ethical Hacking using Kali from A to Z is a realistic security course, . This advanced penetration testing course requires practice, testing, and the ability to want to learn in a manner that will grow your career in the information security field.

Enrolled students will receive every month a virtual machine or remote lab access or a link to a local web application as a challenge and will be requested to try to hack it, this will keep them involve in Ethical Hacking until they reach a stage where they can do that in a real environment.

Advantages of this course:

  1. Lifetime access to course videos
  2. Free access to the student portal
  3. Extra course resources
  4. Attendance certificate with CPEs
  5. 30 day money back guarantee

Materials and extra resources

1
How to get access to the students portal

Introduction

1
Kali Linux Course Introduction

Setup Your Lab

1
Build your lab
2
Setting up your virtual lab
3
Setting up your workspace

Getting Comfortable with Kali Linux

1
Penetration Testing Phases
2
Kali Linux
3
Finding Your Way Around Kali
4
Update-Upgrade-Kali-linux
5
Find, Locate

Managing Kali Linux Services

1
HTTP Service
2
SSH Service

Essential Tools

1
Netcat
2
Grabing the baneer
3
Transferring Files using Netcat
4
Remote Administration using Netcat
5
WireShark
6
Analysis WireShark traffic in a simple way
7
Another WireShark Example

Passive Information Gathering

1
Gather Passive Information
2
Easy Way to get crtical information
3
Passive Information 1
4
Gathering Personal Information
5
Maltego
6
Using Maltego
7
Related Entities in Maltego
8
More Maltego
9
Google Hacking
10
Google Search Operator

Active Information Gathering

1
NMAP
2
Sweeping the network
3
Get more details about the victim
4
NMAP NSE Scripts
5
Zenmap
6
SMB Enumeration
7
SMB Null Session
8
DNS Enumeration
9
DNS Zone Transfer
10
Enum4Linux

Password Attacks

1
Password attack
2
XHydra
3
SSH Cracking
4
Ncrack
5
Ncrack Different OS
6
Use The right Wordlist
7
Crunch
8
The Most amazing and effective Wordlist
9
Final Word about Password attack

Web Application Attacks

1
SQL Injection Introduction
2
What is SQL Injection
3
Setup your web application lab
4
Is The site infected with SQLI
5
The Amazing SQLMAP
6
Live Example

Network Attacks

1
Introduction to Network Attacks
2
Enable Routing
3
MITM attack using Ettercap
4
Start Xplico
5
Ettercap and Xplico attack
6
WireShark and Xplico
7
DNS Spoofing
8
DNS Spoofing attack

Social Engineering

The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

Be the first to add a review.

Please, login to leave a review
30-Day Money-Back Guarantee

Includes

8 hours
Full lifetime access
Access on mobile and TV

Archive

Working hours

Monday9:30 am - 6.00 pm
Tuesday9:30 am - 6.00 pm
Wednesday9:30 am - 6.00 pm
Thursday9:30 am - 6.00 pm
Friday9:30 am - 5.00 pm
SaturdayClosed
SundayClosed
Ethical Hacking using Kali Linux from A to Z Course
Price:
150
Open chat