->

Learn How To Create a Hacking / Penetration Testing Lab


Learn How To Create a Hacking / Penetration Testing Lab
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours | Lec: 11 | 3219 MB
Genre: eLearning | Language: English


Learn how to install Kali Linux, Windows and Metasploitable on a single computer inside your current operating system.

Welcome to my quick course on Ethical Hacking! this course is designed for beginners teaching you how to create a number of virtual computers with different operating systems inside one physical computer, not only that but you will also learn how to configure these systems correctly, linux and terminal basics, how to update the system and some basic linux commands. These multiple computers will be connected through a virtual network so you can use one of them to try and hack into the others.

The course is structured in a way that will take you through the needed software, the structure of the lab and links to the needed operating systems, then you will learn how to install, configure and interact with these systems.

The course is divided into two main sections:

1. Lab Setup - In this section you will learn how to create and install virtual machines, you will also learn why are we installing these specific operating systems, the systems that you will be installing are:

Kali Linux - This is a linux-based operating system, this is going to be the attacker machine because it contains all the tools needed for penetration testing pre-installed and configured correctly.
Windows 10 - This is going to be used as a target, so the idea is to use the Kali machine and try to hack into this machine to practice penetration testing.
Metasploitable - This is a linux based operating system as well, it will be used a second target, Metasploitable is designed to contain a number of vulnerabilities so that it can be used to practice ethical hacking.
2. Linux Basics - In this section you will learn how to interact with Kali linux, you will lean the basic use of the system and how to update it. You will also learn how to interact with the linux terminal and run basic linux commands.

All of these virtual machines work just link normal machines, so you will not lose an features or functionality of the installed operating systems.

NOTE: This course is totally a product of Zaid Sabih and no other organization is associated with it or a certification exam. Although, you will receive a Course Completion Certification from Udemy, apart from that NO OTHER ORGANIZATION IS INVOLVED.

 

Learn How To Create a Hacking / Penetration Testing Lab
Learn_How_To_Create_a_Hacking_Penetration_Testing_Lab.part1.rar - 100.0 MB
Learn_How_To_Create_a_Hacking_Penetration_Testing_Lab.part2.rar - 100.0 MB
Learn_How_To_Create_a_Hacking_Penetration_Testing_Lab.part3.rar - 100.0 MB
Learn_How_To_Create_a_Hacking_Penetration_Testing_Lab.part4.rar - 21.1 MB


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 nagy   |  

Information
Members of Guests cannot leave comments.




rss