Penetration Testing and Ethical Hacking with Kali Linux
Learn how to conduct a practical penetration test using Kali Linux.
What you'll learn
This course introduces ethical hackers and penetration testers to Kali Linux.
This Kali Penetration Testing tutorial will show IT professionals how to use the ethical hacking techniques and how to conduct a professional penetration test workflow using the Swiss Army Knife operating system Kali Linux.
Table of contents
- Introduction 1m
- Gathering Information Checklist 4m
- Write Down Your Findings Using KeepNote 3m
- Visiting the Client Website 2m
- Google Hacking Database 5m
- Using Some Tools on the Web 2m
- Trying Metagoofile to Gather Documents Information 3m
- Gather Contacts Information 3m
- Whois 2m
- DNS Reconnaissance 2m
- Deep Magic Information Gathering Tool 2m
- Discover Scripts 5m
- Playing Around with Recon-ng 9m
- Summary 1m
- Introduction 1m
- Website Penetration Testing Workflow 2m
- Web Application Firewall Scan 1m
- Load Balancer Scan 1m
- Website Crawling 2m
- Burpsuite Proxy 5m
- Burpsuite Target 3m
- Burpsuite Spider 3m
- Burpsuite Discover Contents 5m
- Copy a Website 2m
- SSL Scanning 3m
- CMS Scanning 2m
- Scanning for Web Specific Vulnerabilities 10m
- Sessions Tokens Test 4m
- Exploiting the SQL Injection 4m
- Maintaining Access 4m
- Denial of Service Attack 8m
- Summary 1m
Course FAQ
Kali Linux is a Linux distribution that is designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security.
In order the fully utilize this course, you must download Kali Linux.
Ethical hacking, also known as penetration testing or pen testing, is to legally break into computers or devices to test an organization's defense. This is to ensure that an organization's information systems are secure.
A penetration test is an authorized simulated cyberattack on a computer system. This attack is performed to evaluate the security of the system being attacked.
This Kali Linux course is intenfed for IT professionals and structured to teach them how to use ethical hacking techniques.