YoVDO

Kali Linux - Complete Training Program from Scratch

Offered By: YouTube

Tags

Kali Linux Courses Cybersecurity Courses Cryptography Courses Network Security Courses Ethical Hacking Courses Penetration Testing Courses Malware Analysis Courses Social Engineering Courses SQL Injection Courses Wireless Security Courses

Course Description

Overview

Embark on a comprehensive 18-hour training program that delves deep into the world of ethical hacking and penetration testing using Kali Linux. Learn essential concepts from scratch, including operating system fundamentals, footprinting techniques, Google hacking, DNS reconnaissance, and various social engineering attacks. Master the use of powerful tools like Nmap, Zenmap, and The Harvester for information gathering. Explore malware types, backdoor creation, and advanced attack methods such as Java Applet and Man-in-the-Middle (MITM) attacks. Gain hands-on experience with DNS spoofing, DDoS attacks, and password cracking strategies for both Windows and Linux systems. Dive into wireless network security, Metasploit framework usage, and SQL injection techniques. Conclude with an introduction to cryptography and database management, providing a well-rounded foundation in cybersecurity practices and tools.

Syllabus

Lesson 1 : Introduction.
Lesson 2 : What is Ethical hacking and penetration testing.
Lesson 3 : Kali Linux.
Lesson 4 : Operating Systems.
Lesson 5 : Concepts on Operating.
Lesson 6 : Installing Operating Systems.
Lesson 7 : Installing Vmware Tools.
Lesson 8 : Configuring Kali Linux.
Lesson 9 : Installing Kali Linux On MacBook.
Lesson 10 : What is Footprinting.
Lesson 11 : Footprinting Objectives.
Lesson 12 : Footprinting Tools.
Lesson 13 : Introsuction To Google Hacking.
Lesson 14 : Nuts and Bolts of Google Hacking.
Lesson 15 : Google Hacking Processes.
Lesson 16 : Who is Lookup.
Lesson 17 : DNS Footpronting Overview.
Lesson 18 : DNS Footprinting Function and Process.
Lesson 19 : Determining Operation System.
Lesson 20 : Introduction To Phishing Attacks.
Lesson 21 : Phishing Attacks Details.
Lesson 22 : Connecting Inforation Database.
Lesson 23 : Introduction To Nmap And Zenmap.
Lesson 24 : Nmap.
Lesson 25 : Zenmap.
Lesson 26 : The Harvester Overview.
Lesson 27 : The Harvester Process and Functions.
Lesson 28 : WHO IS and dnsenum Overview.
Lesson 29 : DNSenum.
Lesson 30 : URLcrazy.
Lesson 31 : DNSdict.
Lesson 32 : DNSrecon.
Lesson 33 : DNSmapping.
Lesson 34 : Introduction To Social Engineering and information Gathering.
Lesson 35 : Types Of Social Engineering.
Lesson 36 : Social Engineering Attacks.
Lesson 37 : Spear Phishing Attacks.
Lesson 38 : Phishing Attack.
Lesson 39 : Phishing Attack Consequences.
Lesson 40 : Mass mailer Attack.
Lesson 41 : Introduction To Computer Malwares.
Lesson 42 : Types Of Computer Malwares.
Lesson 43 : Dangerous Viruses Of all Time.
Lesson 44 : Some Prominent Dangerous Viruses Of all Time.
Lesson 45 : Installing Rootkit Hunter.
Lesson 46 : Backdoor Overview.
Lesson 47 : Backdoor Process and Functions.
Lesson 48 : Backdoor Gaining Access.
Lesson 49 : Backdoor Maitaining Access.
Lesson 50 : Backdoor Maitaining Access Continued.
Lesson 51 : Introducing Command Prompt Backdoor.
Lesson 52 : Command Prompt Backdoor Details.
Lesson 53 : Meterpreter Backdoor.
Lesson 54 : I am Root.
Lesson 55 : Foensic Escaping.
Lesson 56 : Hacking Win7 SAM database.
Lesson 57 : Jack The Ripper.
Lesson 58 : Meterpreter Commands.
Lesson 59 : PDF Embedded Trojan Horse.
Lesson 60 : Introduction To Java Applet Attack Method.
Lesson 61 : Java Applet Attack Method Continues.
Lesson 62 : MITM Attack.
Lesson 63 : ARP Poisoning.
Lesson 64 : DNS Spoofing vs DNS Poisoning.
Lesson 65 : DNS Spoofing.
Lesson 66 : Advanced Concepts on DNS Spoofing.
Lesson 67 : DHCP Spoofing.
Lesson 68 : Port Stealing.
Lesson 69 : Introduvtion To ICMP redirection.
Lesson 70 : ICMP redirection Visual Chart.
Lesson 71 : IMPC redirection Process and Functions.
Lesson 72 : Killing a Network.
Lesson 73 : Ddosing Unauthorised Network.
Lesson 74 : Driftnet.
Lesson 75 : Introducing EvilGrade.
Lesson 76 : EvillGrade Continues.
Lesson 77 : Introduction To Dos.
Lesson 78 : DoS VS DDoS.
Lesson 79 : Levels Of DDos Attacks.
Lesson 80 : Preventing DDos Attacks.
Lesson 81 : Introsuction To DDoSing Windows 7.
Lesson 82 : DDosing Windows 7 Methods.
Lesson 83 : Introduction To Hacking.
Lesson 84 : Hacking Though Android.
Lesson 85 : Hacking Android Via Kali Linux.
Lesson 86 : Introduction To Password Cracking.
Lesson 87 : Password Cracking Strategy.
Lesson 88 : Password Cracking Strategy Shown In Practicals.
Lesson 89 : Windows Password Cracking Overview.
Lesson 90 : Nuts And Bolts Of Windows Password Cracking Strategy.
Lesson 91 : Introduction To Linux Hash Cracking.
Lesson 92 : Linux Hash Cracking Strategy.
Lesson 93 : Generating Wordlist Overview.
Lesson 94 : Generating Wordlist Process and Functions.
Lesson 95 : CeWL Cracking.
Lesson 96 : WEP and WPA.
Lesson 97 : WPA Continues.
Lesson 98 : 802 1X Standard.
Lesson 99 : Wireless Cracking Overview.
Lesson 100 : Wriless Cracking Via Kali Linux.
Lesson 101 : Mesterpreter Overview.
Lesson 102 : Activating Payloads.
Lesson 103 : MsFconsole explained.
Lesson 104 : MsDconsole Commands.
Lesson 105 : Exploits.
Lesson 106 : Payloads.
Lesson 107 : Generating Payloads.
Lesson 108 : Generating Payloads Continues.
Lesson 109 : Intro To SQL injection.
Lesson 110 : SQL Injection To Google Dorks.
Lesson 111 : SQL Mapping Via Kali Linux.
Lesson 112 : Gathering Password And Cracking The Hash.
Lesson 113 : Introduction To Cryptography.
Lesson 114 : Basic Concepts On Cryptography.
Lesson 115 : Hash Func and Oracle Method.
Lesson 116 : Birthday Theorem & Digital Signature.
Lesson 117 : Pros and Cons Of Cryptography.
Lesson 118 : Improting Databases.
Lesson 119 : Exporting Darabases.
Lesson 120 : Exporting Databases Shown in Praticals.


Taught by

Free Education For All

Related Courses

Cyber Security Foundations: Common Malware Attacks and Defense Strategies
EC-Council via FutureLearn
Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera
Digital Forensics and Incident Response (DFIR): An Introduction
PA Consulting via FutureLearn
CNIT 126: Practical Malware Analysis
CNIT - City College of San Francisco via Independent
MacOS Dylib Injection through Mach-O Binary Manipulation
Malware Unicorn via Independent