Intro to Kali
Offered By: YouTube
Course Description
Overview
Explore the fundamentals of Kali Linux in this conference talk from SecureWV/Hack3rcon 2016. Dive into various aspects of cybersecurity, including passive reconnaissance, Google hacking techniques, and exploit databases. Learn about device invitation methods, Gmail security, and active reconnaissance using tools like InMap. Gain hands-on experience with Metasploit, understanding its options and defaults. Discover the importance of password hashing and address common audio issues in cybersecurity setups. This comprehensive overview provides valuable insights for both beginners and intermediate users looking to enhance their Kali Linux skills and overall security knowledge.
Syllabus
Intro
Passive Recon
Google Hacking
Google Query
Exploit Database
Device Invite
Gmail
Active Recon
InMap
Metasploit
Run Metasploit
Show options
Defaults
Audio Issues
Password Hashing
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network