YoVDO

Finding Low Hanging Fruit with Kali

Offered By: YouTube

Tags

Security BSides Courses Cybersecurity Courses Ethical Hacking Courses Kali Linux Courses Metasploit Courses Web Security Courses Vulnerability Assessment Courses Password Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of penetration testing and cybersecurity with this conference talk from BSides Nashville 2015. Learn about Kali Linux, a powerful open-source platform for security auditing and penetration testing. Discover how to set up and use Kali, configure Metasploit, and identify common vulnerabilities in systems. Gain insights into finding "low hanging fruit" in cybersecurity, including unnecessary services, weak passwords, exploitable vulnerabilities, and web-based admin interfaces. Perfect for both beginners and experienced professionals looking to enhance their security assessment skills.

Syllabus

Intro
Who Am I?
What is Kali?
How to Get Kali
Setup Kali
Setup Metasploit
A Quick Look at Kali
Low Hanging Fruit
Unnecessary Services
Weak Passwords
Exploitable Vulnerabilities
Web-Based Admin Interfaces
Find out More


Related Courses

Internet History, Technology, and Security
University of Michigan via Coursera
Client-Server Communication
Google via Udacity
HTTP & Web Servers
Udacity
Network Security
Georgia Institute of Technology via Udacity
Web Security Fundamentals
KU Leuven University via edX