KALI Linux For Ethical Hacking
Learn all important tools and techniques of KALI for Ethical Hacking & learn different attacks and defence
IT and Software ,Network and Security,Cyber Security
Lectures -82
Duration -7 hours
Lifetime Access
Lifetime Access
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
Why Kali?
Kali Linux is mainly used for Penetration Testing and Security Auditing. Kali contains several hundred tools that are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering.
Anonymity?
Learn user-friendly tools to maximise Anonymity. Protect your identity while surfing online.
Vulnerability Analysis?
Vulnerability assessment—also called vulnerability analysis—is a process that identifies, quantifies and analyses security weaknesses in IT infrastructure. We will find and exploit systems using weaknesses.
Database Assessment?
We will use free tools built in Kali to perform database assessment.
Wireless Attacks?
We will perform a Brute Force attack on Wi-Fi. We will also perform a dictionary attack on the wireless router. You will learn 7 Steps to hack any Wi-Fi based on WPA/WPA2.
Other Exploitation?
- Metasploit: It is an open-source tool for performing an exploit against a remote target machine.
- Buffer Overflow: Perform buffer overflow attack using Metasploit.
- Meterpreter: Meterpreter is a security product used for penetration testing. Part of the Metasploit Project and Framework, it provides enterprise security teams with the knowledge helpful for addressing vulnerabilities in the targeted application against which Meterpreter is deployed.
- Honeypot: A honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems.
Goals
- Kali Linux Terminal.
- Anonymity.
- Vulnerability Analysis.
- Database Assessment.
- Wireless Attacks.
- Other Exploitation.
Prerequisites
- No skills needed. Learn Everything from Scratch.
Curriculum
Check out the detailed breakdown of what’s inside the course
Introduction
22 Lectures
- Introduction 02:04 02:04
- Unix vs Linux 02:05 02:05
- Why Kali? 02:18 02:18
- Downloading Kali 03:13 03:13
- Different ways to use Kali 02:16 02:16
- VirtualBox 07:10 07:10
- Creating VM 08:29 08:29
- Terminal Basics 04:14 04:14
- Commands 02:54 02:54
- More Commands 06:14 06:14
- Some More Commands 04:02 04:02
- Imp Commands- I 03:17 03:17
- Imp Commands- II 03:26 03:26
- Imp Commands- III 02:18 02:18
- Sort command 01:32 01:32
- Zip and unzip 02:40 02:40
- Whereis 02:16 02:16
- Useradd and more 04:53 04:53
- Permissions 03:27 03:27
- Changing Permissions- I 05:26 05:26
- Changing Permissions- II 03:18 03:18
- Shortcuts in Linux 04:16 04:16
Learning Kali
29 Lectures
Doing More
13 Lectures
More Practical
8 Lectures
Wireless Attacks and Metasploit
10 Lectures
Instructor Details
Shubham Pareek
I have expertise in Linux,Ethical Hacking,Cloud Computing,Hardware and Networking. I have 6+ years of Teaching Experience. I am a Ex Senior Trainer at one of India's top Computer Institute. I have many Certifications to prove my knowledge- RHCSA,RHCE,Openstack,Hybrid Cloud Storage,EC-COUNCIL CEH, CCAS CEH, CompTIA Strata, Virtualization, CHNA and many more other Certifications
Course Certificate
Use your certificate to make a career change or to advance in your current career.
Our students work
with the Best
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe nowOnline Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now