This advanced penetration training course requires practice, testing, as well as the ability to communicate. to You want to Learn in a way that will help you grow in your information security career.
Mohamed Atef – Ethical Hacking using Kali Linux from A to Z Course
Learn Ethical Hacking using Kali from Scratch
This course is for everyone who wants to learn. to Learn Ethical Hacking from Scratch using Kali Linux Moving to Professional penetration testing is a vast field.
Students are introduced to the course to Students will learn the most recent ethical hacking techniques and tools, as well as a teasing laboratory to try different attacks. Students will experience a full penetration test. from A to Z.
Ethical Hacking using Kali from A to Z This is a real security course. This advanced penetration testing course is best practiced and tested. to You want to Learn in a way that will help you grow in your information security career.
Each month, all students who are enrolled will receive a virtual machine, remote lab acces or a link. to A local web application will be required as a challenge. to Try to Hack it. This will keep the participants in Ethical Hacking They will continue to do this until they are able to do it in a real setting.
You can download unlimited files when you purchase Ethical Hacking using Kali Linux from A to Z Course – Mohamed Atef Course StandBySun. The market leader in online learning – Offers a variety of diverse topics: Internet Marketing, Forex & Trading, NLP & Hypnosis, SEO – Traffic, …
Course Curriculum
Materials and other resources
How to get access to The students portal (3.28)
Introduction
Kali Linux Course Introduction (11.31).
Install Your Lab
Build your lab (3:58)
Setting up your virtual laboratory (14:30).
Setting up your workspace (3.39)
Comfortable Living Kali Linux
Phases of penetration testing (4:51).
Kali Linux (8:18)
Finding Your Way Around Kali (4:41)
Up-to-date-Upgrade-Kali-linux (3:38)
Find, Locate (6.35)
Managing Kali Linux Services
HTTP Service (3.59)
SSH Service (3:30).
Essential Tools
Netcat (7.55)
Grab the baneer (2.19)
Transfering Files using Netcat (4.55)
Remote administration using Netcat (2.42)
WireShark (4.41)
Analyze WireShark traffic in a straightforward way (5:51).
Another WireShark Example (4.10)
Passive Information Gathering
Gather passive information (5.35)
Easy Way to Get crtical info (5:54).
Passive Information 1 (11.28)
Collecting Personal Information (7.34)
Maltego (1:48)
Using Maltego (8:09)
Related Entities in Maltego (3.47)
More Maltego (6:01)
Google Hacking (6:54)
Google Search Operator (4.15)
Download immediately Mohamed Atef – Ethical Hacking using Kali Linux from A to Z Course
Active Information Gathering
NMAP (10.15)
Sweeping the Network (4:10)
Learn more about the victim (7.11)
NMAP NSE Scripts (1.35)
Zenmap (5:39)
SMB Enumeration (6.14)
SMB Null Session (6.48)
DNS Enumeration (2.22)
DNS Zone Transfer (6.14)
Enum4Linux (3:01)
Password Attacks
Password attack (5:59)
XHydra (7:28)
SSH Cracking (3.24)
Ncrack (8.40).
Ncrack Different OS (4:02)
Use the right wordlist (4:28).
Crunch (5:59)
The Most powerful and amazing wordlist (6:18).
Final Word on Password Attack (2:21)
Web Application Attacks
SQL Injection Introduction (2:23)
What is SQL Injection (9.48)?
Install your web application lab (9.50)
Is the site infected by SQLI (4.42)?
The Amazing SQLMAP (10.22).
Live Example (6.59)
Network Attacks
Introduction to Network Attacks (9:28)
Enable Routing (3.32)
MITM attack using ettercap (8:08)
Start Xplico (1:41)
Ettercap and Xplico Attack (9:29).
WireShark (10:00) and Xplico (10:00).
DNS Spoofing (10.56)
DNS Spoofing Attack (10:02)
Social Engineering
Social Engineering Introduction (5:11)
Spoofed email (7:07).
Social Engineering Toolkit (5:03)
Fixing Set (5.08)
Credential Harvest (11:10)
Another-SET-Attack-1 (8:12)
Another-SET-Attack-2 (5:38)
Meterpreter Sessions (6.57)
Exploitation and Work
Working with exploit (4.31)
Metasploit (7:29)
Meterpreter session (3.23)
Armitage (2.44)
Fixing armitage (4.38)
Armitage in Action (7.43)
Different Armitage use (9:52).
Armitage Example 2 (7.33)
Network Penetration using Armitage (2.14)
Remote attacks
Port Forwarding (9.24).
Hacking Remotely Deonstration (1:39)
Here’s What You Will Get In Mohamed Atef – Ethical Hacking using Kali Linux from A to Z Course
Course Features
- Lectures 0
- Quizzes 0
- Duration 50 hours
- Skill level All levels
- Language English
- Students 90
- Assessments Yes