[FTUForum.Com] [UDEMY] Hacking 101 - Creating A Hacking Lab (CISA, CEH, CISSP) [FTU]

Torrent Details


[FTUForum.com] [UDEMY] Hacking 101 - Creating a Hacking Lab (CISA, CEH, CISSP) [FTU]

NAME
[FTUForum.com] [UDEMY] Hacking 101 - Creating a Hacking Lab (CISA, CEH, CISSP) [FTU].torrent
CATEGORY
Other
INFOHASH
a903d176fc59cd92de3c8ac26820cecf2889ae1d
SIZE
313 MB in 39 files
ADDED
Uploaded on 16-03-2019 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description





Set up a Safe and Controlled Environment For You to Practice Ethical Hacking - Kali Linux, DVWA, WebGoat



Created by: Arif Gani

Last updated: 2/2018

Language: English

Caption (CC): Included

Torrent Contains: 41 Files

Course Source: https://www.udemy.com/hacking-101-creating-a-hacking-lab/



What you'll learn



• The students will be able to utilize "virtualization" to install all the hacking tools in Kali Linux, and then set up two different vulnerable applications on which they can try to use the Kali Linux tools.



Requirements



• This is made for beginners that are looking to set up a controlled hacking environment at home

• No previous knowledge is necessary - just the want to learn ethical hacking

• Tools: A PC with at least 40 gigs of hard drive space and a decent power on your computer processor



Description



This course is designed to help you create a safe and controlled environment on your local machine to practice ethical hacking methods.  The course will cover the following:



- Discussion on "virtualization" and demo of a virtualized environment installation process



- Discussion on Kali Linux (your hacking tools) and a demo of the installation process.  We will also be talking, post installation, about the types of tools you can find on this application and how you will utilize some of them.



- Discussion on Damn Vulnerable Web Application (DVWA) and a demo of the installation process.  We will also be talking, post installation, about some of the vulnerabilities you can expect to find in this environment and some of the Kali Linux tools you will be using to exploit those vulnerabilities



- Discussion on WebGoat and a demo of the installation process.  We will also be talking, post installation, about some of the vulnerabilities you can expect to find in this environment and some of the Kali Linux tools you will be using to exploit those vulnerabilities



- Discussion of other, third party open vulnerable websites which you can look into after you've started building your skill-set within your controlled hacking lab



- BONUS - there is a short bonus at the end where you can win free courses from me as I develop them in the future.  There will be two give-aways - one to each of the individuals that get the answer right.  So get in on this quick.  I will also be sharing the slide deck I used to create this presentation so you have something tangible to walk away with as well.



Who this course is for:



• Anyone looking to learn ethical hacking

• Anyone who wants to learn how to create a controlled environment for their ethical hacking learning exercises.



For More Udemy Free Courses >>> https://ftuforum.com/

For more Lynda and other Courses >>> https://www.freecoursesonline.me/

Our Forum for discussion >>> https://discuss.ftuforum.com/







Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
1. Introduction.mp427.8 MB
1. Introduction.vtt5.2 KB
10. Installation - Damn Vulnerable Web Application (DVWA) - Part 1.mp441.3 MB
10. Installation - Damn Vulnerable Web Application (DVWA) - Part 1.vtt21.7 KB
11. Installation - Damn Vulnerable Web Application (DVWA) - Part 2.mp417.5 MB
11. Installation - Damn Vulnerable Web Application (DVWA) - Part 2.vtt9.3 KB
12. Explanation - Damn Vulnerable Web Application (DVWA).mp411.3 MB
12. Explanation - Damn Vulnerable Web Application (DVWA).vtt7.7 KB
13. Introduction - WebGoat.mp42.7 MB
13. Introduction - WebGoat.vtt1.3 KB
14. Installation & Explanation - WebGoat.mp418.8 MB
14. Installation & Explanation - WebGoat.vtt12.6 KB
15. Explanation - External Hackable Websites.mp48.2 MB
15. Explanation - External Hackable Websites.vtt4.8 KB
16. Conclusion.mp49.5 MB
16. Conclusion.vtt2.3 KB
17. Bonus.mp415.1 MB
17. Bonus.vtt3.8 KB
17.1 Course Content.pdf.pdf825.4 KB
2. About the Instructor.mp440.3 MB
2. About the Instructor.vtt9.4 KB
3. What You Should Do - Takeaways.mp453.7 MB
3. What You Should Do - Takeaways.vtt9.2 KB
4. Introduction - Virtualization.mp45 MB
4. Introduction - Virtualization.vtt4 KB
5. Installation - VMWare.mp411 MB
5. Installation - VMWare.vtt4.2 KB
6. Introduction - Kali Linux.mp43.5 MB
6. Introduction - Kali Linux.vtt2 KB
7. Installation - Kali Linux - Part 1.mp421 MB
7. Installation - Kali Linux - Part 1.vtt12.1 KB
8. Installation - Kali Linux - Part 2.mp422.4 MB
8. Installation - Kali Linux - Part 2.vtt15.5 KB
9. Introduction - Damn Vulnerable Web Application (DVWA).mp42.2 MB
9. Introduction - Damn Vulnerable Web Application (DVWA).vtt1.3 KB
Discuss.FTUForum.com.html31.9 KB
FreeCoursesOnline.Me.html108.3 KB
FTUForum.com.html100.4 KB
How you can help Team-FTU.txt235 B

Alternative Torrents for 'FTUForum.com UDEMY Hacking Creating Hacking Lab CISA CEH CISSP FTU'.

There are no alternative torrents found.