Learning Network Penetration Testing with Kali Linux
Video description
Be one step ahead of hackers by discovering and patching your network vulnerabilities
About This Video
Develop your skills using attacks such as wireless cracking, Man-in-the-Middle, and Denial of Service (DOS)
Perform advanced assessments and penetration tests like a pro
Use hands-on techniques to take advantage of Kali Linux, the open source framework of security tools
In Detail
Learn how to test your network against various …
Learning Network Penetration Testing with Kali Linux
Video description
Be one step ahead of hackers by discovering and patching your network vulnerabilities
About This Video
Develop your skills using attacks such as wireless cracking, Man-in-the-Middle, and Denial of Service (DOS)
Perform advanced assessments and penetration tests like a pro
Use hands-on techniques to take advantage of Kali Linux, the open source framework of security tools
In Detail
Learn how to test your network against various types of attacks. We will teach viewers how to install Kali Linux, discuss about different phases of pen testing, etc. By the end of this section you will become familiar with the tools that Kali Linux offers to perform network penetration testing, how to exploit the vulnerable systems and how to patch them.
Audience
Cristian Gradisteanu started as an enthusiastic pen tester a few years ago and then used his skills to work as a security consultant. He is a professionalized Ethical hacker& software developer. About Kali Linux, he uses Kali Linux frequently and is very passionate about systems and network security. The other technologies that interest Cristian are Java development, Machine learning, Cloud Computing. Web development, mobile applications development, home automation systems, SEO are the other technical skills he posses.
Getting Familiar with Hardware Requirements and Recommendations
Installing Kali Linux in VirtualBox
Installing Kali Linux on Raspberry Pi
Introducing Kali Linux Interface and Tools
Updating Kali Linux
Networking Fundamentals
Creating a Pen-Testing Lab Environment
Chapter 2 : Learning the Phases of Pen Testing
What Is Penetration Testing?
Reconnaissance
Getting Familiar with Vulnerability Scanning
Gaining and Maintaining Access
Covering Tracks
Chapter 3 : Using Tools for Reconnaissance
Gathering Initial Information
Identifying Live Hosts
Discovering Open Ports
Uncovering Services and Fingerprinting the OS
Chapter 4 : Scanning Vulnerable Systems or Services
Vulnerability Scanning with OpenVAS
Vulnerability Scanning with Nessus
Chapter 5 : Gaining Access
Exploiting the Target System
Cracking the System Passwords
Post Exploitation
Defensive CounterMeasures
Start your Free Trial Self paced Go to the Course We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.
This site uses cookies. By continuing to use this website, you agree to their use.I Accept