[FreeCoursesOnline.Me] [Packtpub.Com] End-To-End Penetration Testing With Kali Linux - [FCO]

Torrent Details


[FreeCoursesOnline.Me] [Packtpub.Com] End-to-End Penetration Testing with Kali Linux - [FCO]

NAME
[FreeCoursesOnline.Me] [Packtpub.Com] End-to-End Penetration Testing with Kali Linux - [FCO].torrent
CATEGORY
Other
INFOHASH
8c1039c458fc67c5353e737c8ade5645afa0590b
SIZE
1.6 GB in 62 files
ADDED
Uploaded on 03-11-2018 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description





Author: Sunil Gupta

Released: Wednesday, October 31, 2018 New Release!

Course Source: https://www.packtpub.com/networking-and-servers/end-end-penetration-testing-kali-linux-video



This course will help you discover the secrets of Pentesting using Linux



Video Details



ISBN 9781789800623

Course Length 7 hours 51 minutes



Table of Contents



WELCOME

LAB SETUP

TERMINAL COMMANDS

INFORMATION GATHERING

VULNERABILITY ANALYSIS

DATABASE HACKING

PASSWORD CRACKING

MAN-IN-THE-MIDDLE ATTACK/SNIFFING

SOCIAL ENGINEERING ATTACK

WIRELESS HACKING

EXPLOITATION TECHNIQUES

POST-EXPLOITATION TECHNIQUES

REPORTING



Video Description



Kali Linux contains a large number of penetration testing tools from various different niches of the security and forensics fields. Kali Linux offers a multitude of options to scan a single IP, port, or host (or a range of IPs, ports, and hosts) and discover vulnerabilities and security holes. This output and information can serve as a precursor to penetration testing efforts. In this course, you will perform tests to carry out and exploit hidden vulnerabilities within your network and systems; you will not only expose these but will also provide ways and methods to fix, secure, and harden your system's security, protecting it against any other attacks.

You will learn how to test your network against various types of attack and develop a network-testing environment that can be used to test scanning tools and techniques. Employ methods effectively used by real hackers to ensure the most effective penetration testing of your network; select and configure the most effective tools from Kali Linux to test network security; employ stealth to avoid detection in the network being tested; and recognize when stealthy attacks are being used against your network. Exploit networks and data systems using wired and wireless networks as well as web services. Identify and download valuable data from target systems and learn to maintain access on compromised systems. Use social engineering to compromise the weakest part of the network—the end users. Use port scanning for UDP scanning, stealth scanning, and connect/zombie scanning using pentesting tools. You will learn how to utilize the arsenal of tools available in Kali Linux to conquer any network environment.

By the end of this course, you will be a pro with the Kali Linux tools you need to perform advanced penetration testing; you will know how to exploit vulnerable systems and how to patch them.



Style and Approach



To hit the market’s demand this course is designed for Freshers and professionals to elevate their skills in Kali Linux. Possessing the importance of learner’s time and goals we will emphasize on complete illustration.



What You Will Learn



Learn Various Information Gathering tools techniques.

Perform Network and Web Vulnerability Analysis.

Learn Database Pentesting Techniques

Perform Password Cracking Techniques

Wifi hacking to learn wireless penetration techniques

Learn MITM and Social Engineering Attack

Perform Exploitation and Post Exploitation Attack

Learn to Generate Final Reports of Penetration Testing



Authors



Sunil Gupta



Sunil Gupta. He is a Certified Ethical Hacker. Currently he teaches 50,000+ students online in 150+ countries.



He is a specialist in the Ethical Hacking and Cyber Security areas.



For More Udemy Free Courses >>> http://www.freetutorials.eu

For more Lynda and other Courses >>> https://www.freecoursesonline.me/

Our Forum for discussion >>> https://discuss.freetutorials.us/







Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
01.Welcome/0101.The Course Overview.mp413.4 MB
01.Welcome/0102.How to Get the Most Out of This Course.mp412.1 MB
01.Welcome/0103.Teaser Hack Updated Windows10 Using Kali Linux.mp446.4 MB
01.Welcome/0104.Kali Linux Basics.mp427.4 MB
02.Lab Setup/0201.Download and Install VMware Workstation.mp413.6 MB
02.Lab Setup/0202.Download Windows and Kali Linux.mp438 MB
02.Lab Setup/0203.Installation of Windows and Kali Linux.mp413.8 MB
02.Lab Setup/0204.Update the Kali Linux Operating System.mp425.1 MB
03.Terminal Commands/0301.File Commands.mp418.9 MB
03.Terminal Commands/0302.Directory Commands.mp424 MB
03.Terminal Commands/0303.Chain Commands.mp424.1 MB
03.Terminal Commands/0304.Manage Services.mp413.5 MB
04.Information Gathering/0401.Using the NetDiscover Tool.mp422.4 MB
04.Information Gathering/0402.Using the Nmap Tool.mp429.1 MB
04.Information Gathering/0403.Using the Sparta Tool.mp415 MB
04.Information Gathering/0404.Using the Maltego Tool.mp441.2 MB
04.Information Gathering/0405.Using the Recon-NG Tool.mp433.8 MB
05.Vulnerability Analysis/0501.Using the Burp Suite Tool.mp442.8 MB
05.Vulnerability Analysis/0502.Using the ZAP Tool.mp437.2 MB
05.Vulnerability Analysis/0503.WordPress Scanning Using WPScan.mp465.7 MB
05.Vulnerability Analysis/0504.Nessus Installation.mp429.7 MB
05.Vulnerability Analysis/0505.Vulnerability Analysis Using Nessus.mp441.3 MB
05.Vulnerability Analysis/0506.Analyze the Web Using HTTrack.mp433.5 MB
06.Database Hacking/0601.Using the SQLite Tool.mp437.9 MB
06.Database Hacking/0602.Using the Sqlmap Tool.mp448.4 MB
06.Database Hacking/0603.Using the JSQL Tool.mp435 MB
06.Database Hacking/0604.Using SQLsus.mp435.8 MB
07.Password Cracking/0701.Using Crunch Commands.mp427.8 MB
07.Password Cracking/0702.Using John the Ripper Tool.mp424.5 MB
07.Password Cracking/0703.FTP Setup.mp436.6 MB
07.Password Cracking/0704.Using Hydra.mp445 MB
07.Password Cracking/0705.Using Medusa.mp442.3 MB
07.Password Cracking/0706.Using Ncrack.mp417.2 MB
08.Man-in-the-Middle AttackSniffing/0801.Using the MAC Changer Tool.mp426.5 MB
08.Man-in-the-Middle AttackSniffing/0802.Using the Wireshark Tool.mp438.3 MB
08.Man-in-the-Middle AttackSniffing/0803.Using the Ettercap Tool.mp431.2 MB
08.Man-in-the-Middle AttackSniffing/0804.Using MITMProxy and Driftnet Tool.mp420.2 MB
09.Social Engineering Attack/0901.Phishing Attack Using SET.mp436 MB
09.Social Engineering Attack/0902.Trojan Attack Using SET.mp442.9 MB
09.Social Engineering Attack/0903.Using the Maltego Tool.mp432.2 MB
09.Social Engineering Attack/0904.Using Browser Exploitation Framework.mp429.3 MB
10.Wireless Hacking/1001.About Wireless Adapter.mp415.7 MB
10.Wireless Hacking/1002.Start Monitor Mode.mp421.9 MB
10.Wireless Hacking/1003.Hack WEP Using the Fern Tool.mp434.2 MB
10.Wireless Hacking/1004.Create a Dictionary.mp414.5 MB
10.Wireless Hacking/1005.Hack WPAWPA2WPA2-PSK.mp423.2 MB
11.Exploitation Techniques/1101.Metasploit Basics.mp434.3 MB
11.Exploitation Techniques/1102.AV Bypass Frameworks.mp425.3 MB
11.Exploitation Techniques/1103.Bypass Target Defender.mp428.5 MB
11.Exploitation Techniques/1104.Bypass Target Antivirus.mp433.1 MB
12.Post-Exploitation Techniques/1201.Meterpreter Commands.mp447.2 MB
12.Post-Exploitation Techniques/1202.Insert Keylogger.mp414.7 MB
12.Post-Exploitation Techniques/1203.Privilege Escalation.mp422.6 MB
12.Post-Exploitation Techniques/1204.Stealing Login Credentials.mp424.5 MB
13.Reporting/1301.Using Leafpad.mp411 MB
13.Reporting/1302.Using CutyCapt.mp421.6 MB
13.Reporting/1303.Using Faraday IDE.mp417 MB
13.Reporting/1304.Using recordMyDesktop.mp420.5 MB
Discuss.FreeTutorials.Us.html165.7 KB
FreeCoursesOnline.Me.html108.3 KB
FreeTutorials.Eu.html102.2 KB
Presented By SaM.txt33 B

Alternative Torrents for 'FreeCoursesOnline.Me Packtpub.Com EndtoEnd Penetration Testing with Kali Linux FCO'.

There are no alternative torrents found.