YoVDO

Kali Linux Installation and Demo

Offered By: YouTube

Tags

Kali Linux Courses Cybersecurity Courses Ethical Hacking Courses SQL Injection Courses Snort Courses VirtualBox Courses Nmap Courses sqlmap Courses

Course Description

Overview

Learn to set up and utilize Kali Linux for cybersecurity through this comprehensive tutorial. Install VirtualBox and Ubuntu Desktop, then proceed to Kali Linux installation on Windows 10. Explore networking concepts by creating NAT and Host-Only networks using VirtualBox. Dive into ethical hacking techniques with NMAP and SQL injection demonstrations. Install Metasploitable 2 for vulnerability testing, and use SQLMAP for automated SQL injection attacks. Conclude with a SNORT demo to understand network intrusion detection and prevention systems. Gain hands-on experience in essential cybersecurity tools and techniques throughout this 90-minute practical guide.

Syllabus

VirtualBox 6.1 2020 Installation on Windows 10 - Cyber Security #1.
Ubuntu Desktop 20.04 LTS Installation on Virtual Box 6.1 2020 - Cyber Security #2.
Kali Linux 2020 installation on VirtualBox 6.1 (Windows 10) - Cyber Security #3.
NAT Network Demo - Creating a NAT Network of VM's in VirtualBox 6.1 - Cyber Security #4.
Host Only Network on VirtualBox 6.1 -Demo using Ubuntu 20.04 and Kali Linux 2020 - Cyber Security #5.
NMAP demo using Kali Linux 2020 - Ethical Hacking - Cyber Security #6.
Manual SQL Injection Demo using DVWA - Ethical Hacking - Cyber Security #7.
Metasploitable 2 - Installation on VirtualBox 6.1 - Cyber Security #8.
Sqlmap demo Using Kali Linux 2020 - SQL Injection using SQLMAP - Ethical Hacking Cyber Security #9.
SNORT Demo - Network Intrusion Detection and Prevention System - Kali Linux - Cyber Security #10.


Taught by

Satish C J

Related Courses

Hacking and Patching
University of Colorado System via Coursera
Software Design Threats and Mitigations
University of Colorado System via Coursera
Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn
Identifying Security Vulnerabilities
University of California, Davis via Coursera
Web Application Security Testing with Burp Suite
Coursera Project Network via Coursera