Start Kali Linux, Ethical Hacking and Penetration Testing!
- Description
- Curriculum
- FAQ
- Reviews
You will get to see screen capture live tutorials showing you everything you need to do to get started with ethical hacking and penetration testing including information about all of the topics below!
Learn the basics of what ethical hacking and penetration testing is to decide whether you want to go to an advanced level! Get a full tutorial on how to install VirtualBox o including on Windows 8.1 and gain the ability to run Kali Linux in any environment. See what to do to create the virtual environment and learn the basics of the Linux terminal.
Continue through the course to learn how to stay anonymous with tor and use Virtual Private Networks (VPN). Follow this information with an introduction to the ethical hacking and penetration testing tools you can use to take your learning from beginner to advanced! See how to change a mac address with macchanger. Discover how to use aircrack for wifi hacking, learn about proxychains, and finish with denial of service attacks.
Take this course now to get your learning started fast as an IT security professional online!
-
1Ethical hacking and penetration testing. What is it and how can you use it?Video lesson
-
2Prerequisites for this course.Video lesson
-
3Basic terminology such as white hat, grey hat, and black hat hacking.Video lesson
-
4Basic terminology including SQL injections, VPN , proxy, VPS, and key loggers.Video lesson
-
5How to get the most out of this course and practice what you learn.Video lesson
-
6Three key ideas for success using this course.Quiz
Know exactly from the beginning the three most important points already made in the course!
-
7Installing VirtualBox with rpm plus why use a virtual machine.Video lesson
-
8Installing VirtualBox using the default package manager from repositories.Video lesson
-
9Creating the virtual environment.Video lesson
-
10Installing VirtualBox Guest AdditionsVideo lesson
-
14Tor part 1.Video lesson
-
15Proxychains part 1.Video lesson
-
16VPN part 1.Video lesson
-
17Macchanger part 1.Video lesson
-
18Nmap part 1.Video lesson
-
19Intro to wifi hacker cracking WPA⁄WPA2.Video lesson
-
20Aircrack and reaver installation.Video lesson
-
21Aircrack-ng crunch usage example 1.Video lesson
-
22Performing denial of service on wireless networks part 1.Video lesson

External Links May Contain Affiliate Links read more