Ethical Hacking and Penetration Testing with Kali Linux (2024) - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Ethical Hacking and Penetration Testing with Kali Linux (2024) (/Thread-Ethical-Hacking-and-Penetration-Testing-with-Kali-Linux-2024) |
Ethical Hacking and Penetration Testing with Kali Linux (2024) - lovewarez - 07-16-2024 Ethical Hacking and Penetration Testing with Kali Linux (2024) Published 7/2024 Created by EDUCBA Bridging the Gap MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 141 Lectures ( 21h 8m ) | Size: 8.1 GB Master the art of ethical hacking and safeguard networks with our comprehensive Kali Linux course What you'll learn: Introduction to Ethical Hacking and Kali Linux: Fundamental concepts of ethical hacking and penetration testing. Installation and configuration of Kali Linux. Footprinting and Reconnaissance: Techniques for gathering information about targets. Tools for footprinting, including Google hacking, WHOIS lookup, and DNS Scanning Networks: Using Nmap and ZenMap for network scanning. Understanding and executing various types of scans to identify open ports and services. Social Engineering and Trojans: Different types of social engineering attacks. Identifying and mitigating threats from trojans and other malware. Exploitation Techniques: Techniques for gaining and maintaining access to systems. Using backdoors and rootkits for exploitation. Advanced Attacks: Conducting advanced attacks such as MITM (Man-In-The-Middle), DNS spoofing, and ICMP redirection. Techniques for DDoS. Hacking Wireless Networks: Methods for cracking wireless network security (WEP, WPA, WPA2). Using Kali Linux tools for wireless network penetration testing. Password Cracking: Strategies for cracking passwords on various operating systems. Generating and utilizing wordlists for brute force attacks. Metasploit Framework: Understanding and using the Metasploit framework for exploitation. Generating and deploying payloads. SQL Injection and Web Application Hacking: Techniques for exploiting SQL injection vulnerabilities. Using tools for SQL mapping and password cracking. Cryptography: Fundamentals of cryptography and its applications in ethical hacking. Understanding hash functions, digital signatures, cryptographic methods. Advanced Penetration Testing: Creating a virtual pentesting lab. Advanced network scanning techniques and exploiting various vulnerabilities. Requirements: Basic Computer Skills: Familiarity with operating systems (Windows, macOS, Linux). Basic understanding of computer networks and internet concepts. Interest in Cybersecurity: A keen interest in learning about cybersecurity, ethical hacking, and penetration testing. Hardware and Software: A computer with at least 4GB of RAM and sufficient storage. Ability to install and run virtual machines (e.g., VMware or VirtualBox). |