YoVDO

Finding Low Hanging Fruit with Kali

Offered By: YouTube

Tags

Security BSides Courses Cybersecurity Courses Ethical Hacking Courses Kali Linux Courses Metasploit Courses Web Security Courses Vulnerability Assessment Courses Password Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of penetration testing and cybersecurity with this conference talk from BSides Nashville 2015. Learn about Kali Linux, a powerful open-source platform for security auditing and penetration testing. Discover how to set up and use Kali, configure Metasploit, and identify common vulnerabilities in systems. Gain insights into finding "low hanging fruit" in cybersecurity, including unnecessary services, weak passwords, exploitable vulnerabilities, and web-based admin interfaces. Perfect for both beginners and experienced professionals looking to enhance their security assessment skills.

Syllabus

Intro
Who Am I?
What is Kali?
How to Get Kali
Setup Kali
Setup Metasploit
A Quick Look at Kali
Low Hanging Fruit
Unnecessary Services
Weak Passwords
Exploitable Vulnerabilities
Web-Based Admin Interfaces
Find out More


Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX