YoVDO

Intro to Kali

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Ethical Hacking Courses Metasploit Courses Password Hashing Courses Google Hacking Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the fundamentals of Kali Linux in this conference talk from SecureWV/Hack3rcon 2016. Dive into various aspects of cybersecurity, including passive reconnaissance, Google hacking techniques, and exploit databases. Learn about device invitation methods, Gmail security, and active reconnaissance using tools like InMap. Gain hands-on experience with Metasploit, understanding its options and defaults. Discover the importance of password hashing and address common audio issues in cybersecurity setups. This comprehensive overview provides valuable insights for both beginners and intermediate users looking to enhance their Kali Linux skills and overall security knowledge.

Syllabus

Intro
Passive Recon
Google Hacking
Google Query
Exploit Database
Device Invite
Gmail
Active Recon
InMap
Metasploit
Run Metasploit
Show options
Defaults
Audio Issues
Password Hashing


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube