Genre: eLearning | Language: English + .VTT | Duration: 8 hours | Size: 3.32 GB
What you'll learn Homepage: https://www.udemy.com/ethical-hacking-novice-to-ninja/
Build a resilient testing lab
Take a systematic approach to corporate Penetration Testing
Acquire requisite information about your target
Investigate systems and networks for exposures
Employ various forms of Shells
Break into Windows and Linux computers
Steal Windows, Linux and Web-based credentials
Conceal sensitive data
Compromise an Active Directory domain
Requirements
Basic IT skills
No Linux, Programming or Prior Hacking knowledge needed
At least 4gb RAM
Description
Kali is a flavor of Linux targeted at digital forensics experts and Penetration Testers. It includes over 400 pen-testing programs, and is the primary tool used by ethical hackers. Using Kali Linux, certified ethical hackers can test networks on their organizations' behalves, to determine if they're susceptible to internal and external attacks.
Businesses are connected, and as such, they're also exposed. Vulnerability testing helps organizations limit that exposure. This course will help you explore the techniques, and tools of the trade.
This course will give prospective ethical hackers a detailed look into the skills and knowledge required of a security professional. We're going to start by setting up our own virtual environment for testing.
Over several weeks, we will take the following path.
Building your lab
Gathering Information
Vulnerability Scanning
WebApp PenTesting
System Shells
Basic Exploitation
System Hacking
Who this course is for:
Anyone wanting to learn Ethical Hacking & Penetration Testing right from scratch.
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.