Setup Menus in Admin Panel

  • LOGIN
  • No products in the cart.

Course Name : Learning Kali Linux

Descriptions

Course Curriculum

Section 1: What Is Ethical Hacking
The Course Overview 00:00:00
Penetration Testing 00:00:00
White Box, Black Box, Gray Box 00:00:00
Vulnerability Assessment & Penetration Testing 00:00:00
Ethical Hacker Responsibilities and Customer Expectations 00:00:00
Laws and Legal Obligations 00:00:00
Section 2: Ethical Hacking Process
Preparation Steps for Penetration Testing 00:00:00
First Step of Penetration Testing – Reconnaissance 00:00:00
Scanning, Enumeration, and Fingerprinting 00:00:00
Vulnerability Assessment 00:00:00
Exploitation and Access 00:00:00
Reporting 00:00:00
Section 3: Creating the Test Lab with Kali Linux
Test Lab Requirements 00:00:00
Diagram and Design 00:00:00
Test Connectivity 00:00:00
Section 4: Reconnaissance
Passive Reconnaissance – Part 1 00:00:00
Passive Reconnaissance – Part 2 00:00:00
Active Reconnaissance 00:00:00
Dmitry 00:00:00
Maltego 00:00:00
Section 5: Scanning – Part 1
TCP, UDP and, ICMP Scanning 00:00:00
Nmap – ICMP Scan 00:00:00
Nmap – TCP Scan 00:00:00
Nmap – Advanced TCP Scans 00:00:00
Nmap – UDP Scan 00:00:00
Section 6: Scanning – Part 2
O.S Detection 00:00:00
Avoid Detection 00:00:00
Nmap – Scripts and Script Engine 00:00:00
Nmap Troubleshooting 00:00:00
hping3 00:00:00
Section 7: Vulnerability Scanning and Exploitation
Nikto 00:00:00
Sparta 00:00:00
Ettercap 00:00:00
Metasploit 00:00:00
Armitage 00:00:00
Section 8: Exploitation and Backdoors
Spear Phishing Attacks 00:00:00
Credential Harvesting with Website Cloning 00:00:00
Netcat 00:00:00
John the Ripper 00:00:00
Online Learning Thailand.
X