Video description
Go through the basics of network security and penetration testing to begin your journey to becoming an ethical hacker: a skilled professional who looks for weaknesses and vulnerabilities in software systems and uses this knowledge to defend them from external breaches. You will learn the concepts of ethical hacking and look at issues from a hacker’s perspective.
The video is divided into six sections, covering various aspects of ethical hacking for a beginner to grasp. Starting with an introduction to the basics of ethical hacking, you will go through common terminologies used and also learn to install your first virtual machine. You will then take a look at various Linux terminal commands and also learn to perform basic operations with them. The following sections will introduce footprinting and vulnerability scanning, where you will learn how these processes work by going through examples. In conclusion, you will learn what exploitation is and how a minor vulnerability in the system can lead to a breach.
What You Will Learn
- Gain a basic understanding of ethical hacking
- Set up your first virtual machine
- Get acquainted with Linux terminal commands
- Carry out network and web penetration testing
- Spot vulnerabilities in the software system
Who This Video Is For
Anybody who is interested in learning ethical hacking/penetration testing and who wants to learn how to secure their websites and networks from hackers.
Table of Contents
Introduction to Ethical Hacking
00:03:53
Basics
00:03:54
Ethical Hacking Terminologies
00:03:54
Lab Setup
00:04:04
Installation of Virtual Machine
00:04:04
Installation of Windows and Kali Linux
00:07:32
Linux Basics
00:03:47
Common Linux Terminal Commands
00:03:47
Basic Operations in Linux
00:04:44
Footprinting
00:02:41
Footprinting Basics
00:02:41
Footprinting Example
00:08:04
Vulnerability Scanning
00:02:21
Scanning Basics
00:02:21
Scanning Example
00:10:34
Exploitation
00:03:05
Exploitation Basics
00:03:05
Exploitation Attack
00:10:48