Ethical Hacking with Kali Linux

0 (0 REVIEWS)
11 STUDENTS

GET THIS COURSE AND 2500+ OTHERS FOR ONLY £49 FIND OUT MORE

Overview:

Welcome to “Ethical Hacking with Kali Linux!” This course is your gateway to the world of ethical hacking, where you’ll learn to use Kali Linux, a powerful penetration testing platform, to uncover vulnerabilities in computer systems and networks. Whether you’re interested in cybersecurity, IT, or simply curious about hacking techniques, this course will equip you with the knowledge and skills to identify and mitigate security threats ethically.

  • Interactive video lectures by industry experts
  • Instant e-certificate and hard copy dispatch by next working day
  • Fully online, interactive course with Professional voice-over
  • Developed by qualified first aid professionals
  • Self paced learning and laptop, tablet, smartphone friendly
  • 24/7 Learning Assistance
  • Discounts on bulk purchases

Main Course Features:

  • Comprehensive training on using Kali Linux tools for ethical hacking and penetration testing
  • Hands-on exercises and simulated scenarios to practice real-world hacking techniques
  • Coverage of various hacking methodologies, including reconnaissance, scanning, exploitation, and post-exploitation
  • Guidance on conducting vulnerability assessments and penetration tests on target systems
  • Practical demonstrations of common attack vectors and mitigation strategies
  • Access to a virtual lab environment for experimenting with hacking techniques safely
  • Discussion of legal and ethical considerations in ethical hacking and cybersecurity
  • Supportive community forums for sharing insights, troubleshooting, and networking

Who Should Take This Course:

  • IT professionals, cybersecurity enthusiasts, and aspiring ethical hackers seeking hands-on experience in penetration testing
  • System administrators and network engineers interested in identifying and addressing security vulnerabilities in their systems
  • Students pursuing degrees or certifications in cybersecurity, information technology, or related fields
  • Anyone curious about ethical hacking and cybersecurity practices, with a desire to learn and contribute to digital security efforts

Learning Outcomes:

  • Understand the principles and methodologies of ethical hacking and penetration testing
  • Gain proficiency in using Kali Linux tools for reconnaissance, scanning, exploitation, and post-exploitation
  • Identify common vulnerabilities in computer systems and networks and assess their severity
  • Conduct ethical hacking assessments and penetration tests on target systems safely and responsibly
  • Develop critical thinking and problem-solving skills to analyze and exploit security weaknesses
  • Implement security best practices and mitigation techniques to defend against cyber threats
  • Navigate legal and ethical considerations in ethical hacking and adhere to ethical guidelines and standards
  • Prepare for industry-recognized certifications in ethical hacking and cybersecurity.

Certification

Once you’ve successfully completed your course, you will immediately be sent a digital certificate. Also, you can have your printed certificate delivered by post (shipping cost £3.99). All of our courses are fully accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. Our certifications have no expiry dates, although we do recommend that you renew them every 12 months.

Assessment

At the end of the Course, there will be an online assessment, which you will need to pass to complete the course. Answers are marked instantly and automatically, allowing you to know straight away whether you have passed. If you haven’t, there’s no limit on the number of times you can take the final exam. All this is included in the one-time fee you paid for the course itself.

Course Curriculum

Unit 01: Introduction and Installation
Introduction to the course 00:05:00
Virtual box installation 00:16:00
Kali linux installation 00:14:00
Enabling full screen 00:18:00
Unit 02: Basic Linux Commands
Basic commands part 1 00:10:00
Basic commands part 2 00:21:00
Basic commands part 3 00:13:00
Unit 03: Creating a Secure Hacking Environment
Changing ip address and wireless adapter setup 00:05:00
Creating a bootable Kali USB drive 00:05:00
Essential networking terms 00:10:00
Essential hacking terms 00:18:00
Additional kali tools to install 00:09:00
Changing our MAC address with mac changer 00:06:00
Unit 04: Footprinting
Google hacking 00:13:00
Nikto basics 00:11:00
Whois tools 00:07:00
Email harvesting 00:06:00
Shodan 00:10:00
Zone transfer with Dig 00:07:00
Unit 05: Scanning
Installing Metasploitable 00:07:00
Nmap part 1 00:16:00
Nmap part 2 00:12:00
Nmap part 3 00:12:00
Zen map 00:08:00
TCP scans 00:16:00
Nmap by passing defenses 00:17:00
Nmap scripts part 1 00:09:00
Nmap scripts part 2 00:14:00
Unit 06: Website Penetration Testing
Installing OWASP 00:08:00
HTTP request 00:10:00
HTTP response 00:10:00
Burpsuite configuration 00:13:00
Editing packets in Burpsuite 00:12:00
Whatweb and Dirb 00:10:00
Password recovery attack 00:16:00
Burpsuite login bruteforce 00:11:00
Hydra login bruteforce 00:09:00
Session fixation 00:14:00
Injection attacks 00:06:00
Simple command injection 00:11:00
Exploiting command injection vulnerability 00:08:00
Finding blind command injection 00:14:00
SQL basics 00:10:00
Manual SQL injection part 1 00:13:00
Manual SQL injection part 2 00:21:00
SQL map basics 00:17:00
XML injection 00:16:00
Installing XCAT and preventing injection attacks 00:06:00
Reflected XSS 00:11:00
Stored XSS 00:12:00
Changing HTML code with XSS 00:07:00
XSSer and XSS sniper 00:14:00
Unit 07: Wireless Cracking
Wireless attacking theory 00:11:00
Enabling monitor mode 00:05:00
Capturing handshake with airodump 00:15:00
Rockyou.txt 00:14:00
Cracking with aircrack 00:16:00
Cracking with hashcat 00:15:00
Creating password lists with crunch 00:18:00
Creating password lists with cup 00:07:00
Rainbow tables part 1 00:17:00
Rainbow tables part 2 00:06:00
Installing fluxion 00:06:00
Finding and cracking hidden networks 00:08:00
Preventing wireless attacks 00:08:00
Unit 08: Man in the Middle Attacks
ARP protocol basics 00:10:00
Man in the middle attack theory 00:07:00
Installing MITMf 00:07:00
Manual ARP spoofing 00:13:00
Problems while installing MITMf 00:06:00
HTTP traffic sniffing 00:08:00
DNS spoofing and HTTPS password sniffing 00:24:00
Hooking browser with BEEF 00:16:00
Screenshotting targets browser 00:11:00
Cloning any webpage 00:09:00
Ettercap basics 00:07:00
Unit 09: System Hacking with Metasploit
MFS console environment 00:16:00
Metasploit modules explained 00:12:00
Bruteforcing SSH with Metasploit 00:15:00
Attacking tomcat with metasploit 00:09:00
Getting meterpreter with command injection 00:25:00
PHP code injection 00:06:00
Metasploitable exploits 00:07:00
Wine installation 00:12:00
Creating windows payloads with Msfvenom 00:10:00
Encoders and Hex editors 00:19:00
Windows 10 meterpreter shell 00:12:00
Meterpreter environment 00:11:00
Windows 10 privilege escalation 00:11:00
Preventing privilege escalation 00:06:00
Post exploitation modules 00:14:00
Getting Meterpreter over Internet with port forwarding 00:11:00
Eternalblue exploit 00:20:00
Persistence module 00:13:00
Hacking over the internet with Ngrok 00:10:00
Android device hacking with venom 00:10:00
The real hacking begins now! 00:02:00
Unit 10: Python Crash Course
Variables 00:14:00
Raw input 00:11:00
If else statements 00:10:00
For loops 00:07:00
While loops 00:08:00
Python lists 00:08:00
Functions 00:15:00
Classes 00:10:00
Importing libraries 00:07:00
Files in python 00:12:00
Try and except the rule 00:05:00
Unit 11: Coding an Advanced Backdoor
Theory behind reverse shells 00:07:00
Simple server code 00:13:00
Connection with reverse shell 00:07:00
Sending and receiving messages 00:11:00
Sending messages with while true loop 00:08:00
Executing commands on target system 00:10:00
Fixing backdoor bugs and adding functions 00:20:00
First test using our backdoor 00:18:00
Trying to connect every 20 seconds 00:12:00
Creating persistence part 1 00:06:00
Creating persistence part 2 00:17:00
Changing directory 00:12:00
Uploading and downloading files 00:22:00
Downloading files from the internet 00:23:00
Starting programs using our backdoor 00:07:00
Capturing screenshots on the target PC 00:19:00
Embedding backdoor in an image part 1 00:13:00
Embedding backdoor in an image part 2 00:09:00
Checking for administrator privileges 00:12:00
Adding help option 00:09:00
Unit 12: Creating a Key logger for the Backdoor
Importing Pynput 00:10:00
Simple keylogger 00:10:00
Adding report function 00:11:00
Writing key strokes to a file 00:14:00
Adding the keylogger to our reverse shell part 1 00:23:00
Adding the keylogger to our reverse shell part 2 00:08:00
Final project test 00:14:00
Unit 13: Basic Authentication Bruteforcer
Printing banner 00:11:00
Adding available options 00:11:00
Starting threads for bruteforce 00:08:00
Writing function to run the attack 00:11:00
Bruteforcing router login 00:10:00
Bypassing antivirus with your future programs 00:14:00
Sending malware with spoofed email 00:15:00
Unit 14: BONUS - Building a Career in Cyber Security
What will you learn in this section? 00:03:00
Why is ethical hacking a valuable skill? 00:23:00
What is the best ethical hacking certification? 00:17:00
Tips for getting your first job as an ethical hacker 00:18:00
How I started my career as an ethical hacker 00:14:00
How to price your work 00:11:00
Unit 15: Additional Content: Grand Finale
Bonuses. Enjoy the Benefits 01:05:00
Ethical Hacking with Kali Linux
ex Vat

SAVE 80% - OFFER ENDS SOON

TAKE THIS COURSE
  • Original price was: £125.00.Current price is: £25.00. ex Vat
  • 1 year
  • Course Badge
  • Course Certificate
  • 1 day, 5 hours
  • Gift this course
£25 /Unit Price
Total:
£125.00
Quantity:

Buying more than one of the same courses?

  • 50% discount for orders of 10+ courses
  • 60% discount for orders of 50+ courses
  • 70% discount for orders of 100+ courses

Looking for a more personalised package?

contact us now

Instructors

11 STUDENTS ENROLLED

 

0
    0
    Your Cart

    UPGRADE TO GET UNLIMITED ACCESS TO ALL COURSES FOR ONLY £49

    ADD OFFER TO CART

    Full access to all courses for 12 months, with unlimited free accredited certificates. This offer is available for a limited time only.

      Apply Coupon