Vind een opleiding

End-to-End Ethical Hacking with Kali Linux!: 4-in-1 - Udemy

Doelgroep: Beginner
Duur: 113 colleges - 11 uur
Richtprijs: € 12,99
Taal: Engels
Aanbieder: Udemy

>> proefles

Cyber threats are on the increase with the rising growth of technology, thus giving rise to the need for Ethical Hacking and advanced security. For everyone interested in learning the techniques for exploiting vulnerabilities in servers and websites, Ethical Hacking is the answer! Kali Linux offers a large number of penetration testing tools from various niches in the security and forensics fields. A multitude of options to scan a single IP, port, or host (or a range of IPs, ports, and hosts) to uncover vulnerabilities and security holes. By taking up this course, you’ll become a master at any hacker's game by discovering and understanding each of the major tools that every hacker is currently using!  

This comprehensive 4-in-1 course is an exhaustive course packed with step-by-step instructions, working examples, and the combination of theory followed by hands-on application of a tool! To begin with, you’ll learn the secrets of ethical hacking, penetration testing, and white hat techniques using Kali Linux. You’ll work with network routers and see how to map them. Explore easy ways to scan single IP addresses, or a range of IP addresses, complete with ports, hosts, and even security holes. Finally, you’ll become proficient at performing network penetration tests and learn to exploit vulnerable systems!

By the end of the course, you’ll not only learn the secrets of ethical hacking, penetration testing, and network discovery using Kali Linux but also discover techniques used by hackers to exploit your servers, Bluetooth devices, WordPress, network security flaws & more!

Contents and Overview

This training program includes 4 complete courses, carefully chosen to give you the most comprehensive training possible.

The first course, Learning Kali Linux, covers the secrets of ethical hacking, penetration testing, and network discovery using Kali Linux. The course starts with vulnerability assessment and penetration testing. Then, you will learn about the process of Ethical hacking from the initial identification and investigation to the final exploitations and report. Next, we will build a test lab in a virtual environment using Oracle Virtual Box, Kali Linux, and a vulnerable OS. You will get started with reconnaissance to gather information about a target. Next, you will focus on NMAP, which is one of the biggest and most popular networks and host scanning tools. You will also learn to avoid being detected by firewalls and IPs when using NMAP. Vulnerability assessment and analysis are the most important steps before trying to hack and penetrate a system so we will learn to initiate an exploit and penetrate a system. Finally, you'll exploit a system and, once exploitation is confirmed, you'll prepare and present a report to the customer. By the end of the course, you will be an excellent hacker and will have mastered all the how's and whys of Ethical hacking.

The second course, Information Gathering with Kali Linux, covers planning your installation with Kali Linux using the best hardware. This course not only shows you how to install Kali Linux but also how to properly plan the installation and select the best hardware. We’ll include post-installation tasks and you’ll see how to configure Kali Linux to get the best performance, as well as ensuring your project needs are satisfied. Within this, we’ll show you how to gather information using the tools present in Kali Linux. The tools used in this course teach you how to acquire information about a target including web applications, documents, metadata, and other popular and powerful tools included with the distribution. This course helps you plan and install Kali Linux to get the optimal results for your specific needs. We’ll emphasize how to choose the best hardware and install the distribution and troubleshoot problems that may arise during the process. The course wraps up with post-installation and configuration tasks.

The third course, Scanning, and Enumeration with Kali Linux cover extracting information from a target using various scanning tools. This course will explore the different types of applications and commands to be run on a remote system based on types of goals that an attacker wishes to accomplish. It will cover how to extract useful information from a target that has been located. This course will teach the viewers I detail about enum4linux with which one will be able to extract useful information. One will be able to explore the amap tool. This tool can be used to identify services running on non-standard ports. As you go ahead, this course will teach one how to extract useful information from a target that they have located. The viewers will also be taught how to discover non-contiguous IP blocks using dnsenum and how to scan with Nikto. This is the logical follow up to information gathering where we take the information we have gathered and then use that to more closely investigate a target

The fourth course, Mastering Kali Linux, covers discovering techniques used by hackers to exploit your servers, Bluetooth devices, WordPress, network security flaws & more! You will discover proper techniques to hack into any WordPress websites to test for vulnerabilities and weaknesses. Then dive deep into website and server scanning as well as network scanning and testing for any open security breaches. In addition, you will get introduced to Bluetooth hacking for any open Bluetooth enabled devices near you. Finally, explore the ultimate Social Engineering Toolkit embedded inside your Kali machine. By the end of this course, you will have mastered Kali Linux in order to be the most efficient ethical hacker to carry out proper penetration testing upon your target, as well as discovering how to increase your own networks security.

By the end of the course, you’ll not only learn the secrets of ethical hacking, penetration testing, and network discovery using Kali Linux but also discover techniques used by hackers to exploit your servers, Bluetooth devices, WordPress, network security flaws & more!

About the Authors

  • Rassoul Ghaznavi Zadeh is an information security architect. He has worked with business to define frameworks, perform risk and gap analysis, and identify security controls and roadmaps. He also works with stakeholders to plan, organize, and manage the successful delivery of security strategies and projects as well as the stable operation of the organization's IT infrastructure security, integration, and optimization.
    His key skills are:
    Enterprise security architecture design and business alignment
    Risk assessment, management, compliance, and auditing
    Evaluating and analyzing IT security technologies and solutions
    Monitoring and measuring the effectiveness of IT security controls
    Vulnerability assessment and penetration testing

  • Sean-Philip Oriyano is a longtime security professional. Over the past 25 years, he has divided his time between performing security research, consulting, and delivering training in the fields of both general IT and cybersecurity. In addition, he is a best-selling author with many years of experience in both digital and print media. Sean has published several books over the past decade and has expanded his reach further by appearing on TV and radio shows. Additionally, Sean is a Chief Warrant Officer and Unit Commander specializing in cybersecurity training, development, and strategy. As a CWO, he is recognized as an SME in his field and is frequently called upon to provide expertise, training, and mentoring wherever needed.


  • Aubrey Love II has been designing and developing websites for over 10+ years. He started off with a Commodore Vic20, on which he designed his first Hello World app at the age of 7. After attending several colleges and universities, he moved on and started his own website firm, in which he caters to all types of company, from startup ventures to Fortune 500 organizations.


>> Meer info