Video description
Do you want to learn the tools that Kali Linux offers to perform vulnerability assessment and penetration testing? Then this course is for you!
The course will start from scratch and will provide you with essential knowledge of the most happening and widely used tools available in Kali Linux by performing real-world practicals. You will learn information gathering and scanning, perform vulnerability analysis, and learn database attacks and password attacks.
After completion of this course, you will be able to use Kali Linux tools for vulnerability analysis.
Table of Contents
Chapter 1: Welcome and Introduction to Kali Linux
Course Overview
How to Get the Most Out of This Course?
What Are the Benefits of This Course?
Teaser: Hack a Website and Collect Sensitive Data
About Kali Linux Operating System
Chapter 2: Lab Setup for Pen Testing
Install Virtual Machine
Download Windows 10 and Kali Linux
Installation of Windows 10 and Kali Linux
Update Kali Linux Operating System
Chapter 3: Information Gathering and Scanning
About Information Gathering and Scanning
Using Dmitry Tool
Using Netdiscover Tool
Using Nmap Tool
Using Zenmap Tool
Using Sparta Tool
Using Maltego Tool
Using Recon-ng Tool
Chapter 4: Vulnerability Analysis
About Vulnerability Analysis
Using Zed Attack Proxy (ZAP) Tool
Using Burpsuite Tool
Using Skipfish Tool
Using httrack Tool
Using wpscan Tool
Using Nikto Tool
Nessus Tool Installation
Using Nessus Tool
Chapter 5: Database Attacks
About Database Attacks
Using SQLite Database
Using jsql Tool
Using sqlsus Tool
Using sqlmap Tool
Chapter 6: Password Attacks
About Password Attacks
Using Cewl Tool
Using John the Ripper Tool
Using Crunch Commands
Setup File Transfer Protocol
Using Hydra Tool
Using Medusa Tool
Using Ncrack Tool