YoVDO

Start Kali Linux, Ethical Hacking and Penetration Testing!

Offered By: Udemy

Tags

Kali Linux Courses Ethical Hacking Courses Penetration Testing Courses

Course Description

Overview

Learn the basics of ethical hacking, penetration testing, web testing and wifi hacking in kali linux!

What you'll learn:
  • Step by step instructions for insulation VirtualBox and creating your virtual environment on Windows, Mac, and Linux.
  • An introduction to attacking networks and breaking passwords.
  • Tips for remaining anonymous in hacking and penetration testing activities.
  • A clear understanding of what ethical hacking and penetration testing is.

You will get to see screen capture live tutorials showing you everything you need to do to get started with ethical hacking and penetration testing including information about all of the topics below!

Learn the basics of what ethical hacking and penetration testing is to decide whether you want to go to an advanced level! Get a full tutorial on how to install VirtualBox o including on Windows 8.1 and gain the ability to run Kali Linux in any environment. See what to do to create the virtual environment and learn the basics of the Linux terminal.

Continue through the course to learn how to stay anonymous with tor and use Virtual Private Networks (VPN). Follow this information with an introduction to the ethical hacking and penetration testing tools you can use to take your learning from beginner to advanced! See how to change a mac address with macchanger. Discover how to use aircrack for wifi hacking, learn about proxychains, and finish with denial of service attacks.

Take this course now to get your learning started fast as an IT security professional online!


Taught by

Ermin Kreponic

Related Courses

Advanced Python Scripting for Cybersecurity
Infosec via Coursera
Python for Command-and-control, Exfiltration and Impact
Infosec via Coursera
Fundamentos del Internet de las cosas (IoT): Seguridad I
Galileo University via edX
MSc Cyber Security
Coventry University via FutureLearn
Cyber Incident Response
Infosec via Coursera