YoVDO

Learning Kali Linux

Offered By: LinkedIn Learning

Tags

Kali Linux Courses Cybersecurity Courses Ethical Hacking Courses Virtualization Courses Burp Suite Courses Nmap Courses Password Cracking Courses Vulnerability Scanning Courses Nikto Courses

Course Description

Overview

Explore the tools you need to become a proficient ethical hacker: Kali Linux running in a VirtualBox environment, the Metasploitable system, and a Juice Shop website for testing.

Syllabus

Introduction
  • Using Kali Linux to succeed in ethical hacking
  • What you should know
  • Disclaimer
1. Building a VirtualBox Test Lab
  • Introduction to virtualization
  • Setting up a virtual lab
  • A first look at VirtualBox
  • Installing Kali as an appliance
  • Installing Metasploitable from a virtual disk
  • Installing Linux from an ISO file
  • Installing the Juice Shop
  • Installing Windows 11
  • Using VirtualBox's advanced VM options
2. Kali
  • Starting with Kali
  • Customizing the terminal window
  • Using the application menu
  • Setting up favorites
  • Updating Kali
  • Browsing with Kali
  • Taking notes
3. Information Gathering
  • Information gathering with Kali
  • Using deep magic for reconnaissance
  • Using DNS for passive reconnaissance
  • Using Shodan to enumerate the internet
  • Active target reconnaissance
  • Taking a quick peek at a web server
4. Vulnerability Scanning
  • Vulnerability scanning with Kali
  • Using Nikto to scan a web server
  • Zapping a website
  • Using Burp Suite to scan a website
  • Busting open a website
5. Password Cracking
  • Introducing password recovery
  • Using command line tools for dictionaries
  • Having a ripping good time
  • Cracking Windows passwords
6. Exploiting Targets
  • Overview of exploitation tools
  • Shortlisting exploits
  • Exploiting Linux with Metasploit
  • Spraying passwords with Hydra
  • Exploiting Windows with Venom
7. Building a Cyber Range
  • Using Kali Purple to build cyber range tools
  • Building a cyber range attack script
  • Running our first cyber range attack
  • Using VulnHub servers in a cyber range
Conclusion
  • Next steps

Taught by

Malcolm Shore

Related Courses

Advanced Python Scripting for Cybersecurity
Infosec via Coursera
Python for Command-and-control, Exfiltration and Impact
Infosec via Coursera
Fundamentos del Internet de las cosas (IoT): Seguridad I
Galileo University via edX
MSc Cyber Security
Coventry University via FutureLearn
Cyber Incident Response
Infosec via Coursera