Complete Penetration Testing With Kali Linux


ABOUT COURSE

In this course, you will perform tests to carry out and exploit hidden vulnerabilities within your network and systems; you will not only expose these but will also provide ways and methods to fix, secure, and harden your system’s security, protecting it against any other attacks.

You will learn how to test your network against various types of attacks and develop a network-testing environment that can be used to test scanning tools and techniques. Employ methods effectively used by real hackers to ensure the most effective penetration testing of your network; select and configure the most effective tools from Kali Linux to test network security; employ stealth to avoid detection in the network being tested, and recognize when stealthy attacks are being used against your network. Exploit networks and data systems using wired and wireless networks as well as web services. Identify and download valuable data from target systems and learn to maintain access to compromised systems. 
Use social engineering to compromise the weakest part of the network—the end-users. Use port scanning for UDP scanning, stealth scanning, and connect/zombie scanning using pen-testing tools. You will learn how to utilize the arsenal of tools available in Kali Linux to conquer any network environment.

By the end of this course, you will be a pro with the Kali Linux tools you need to perform advanced penetration testing; you will know how to exploit vulnerable systems and how to patch them.


COURSE CONTENT

  • WELCOME
  • LAB SETUP
  • TERMINAL COMMANDS
  • INFORMATION GATHERING
  • VULNERABILITY ANALYSIS
  • DATABASE HACKING
  • PASSWORD CRACKING
  • MAN-IN-THE-MIDDLE ATTACK/SNIFFING
  • SOCIAL ENGINEERING ATTACK
  • WIRELESS HACKING
  • EXPLOITATION TECHNIQUES
  • POST-EXPLOITATION TECHNIQUES
  • REPORTING

COURSE SIZE

Size: 1.63 GB


https://www.packtpub.com/networking-and-servers/end-end-penetration-testing-kali-linux-video.