Kali Linux - Complete Training Program from Scratch

seeders: 1
leechers: 0
Added on July 24, 2015 by hawaiizfynestin Other > Unsorted
Torrent verified.



Kali Linux - Complete Training Program from Scratch (Size: 3.72 GB)
 002 What is Ethical hacking and Penetration testing.mp427.65 MB
 001 Introduction.mp417.7 MB
 002 Operating systems Overview.mp414.95 MB
 001 Kali Linux.mp446.94 MB
 006 Configuring Kali Linux.mp444.86 MB
 005 Installing vmware tools.mp433.1 MB
 004 Installing Operating Systems.mp419.56 MB
 003 Concepts on Operating systems.mp424.94 MB
 007 Installing Kali Linux on MacBook.mp450.37 MB
 015 Nmap.mp446.58 MB
 016 ZenMap.mp443.89 MB
 008 DNS footprinting Overview.mp426.3 MB
 007 Who is lookup.mp436.4 MB
 014 Introduction to Nmap and ZenMap.mp450.84 MB
 013 Connecting information database.mp434 MB
 009 DNS footprinting Functions and Process.mp421.19 MB
 010 Determining Operation System.mp435.06 MB
 011 Introduction to Phishing Attacks.mp430.73 MB
 012 Phishing Attacks Details.mp424.37 MB
 003 WHO IS and dnsenum Overview.mp439.49 MB
 002 The Harvester Process and Functions.mp426.42 MB
 004 DNSenum.mp426 MB
 007 DNSrecon.mp442.18 MB
 005 URLcrazy.mp433.23 MB
 006 DNSdict.mp439.38 MB
 008 DNSmapping.mp434.98 MB
 001 The Harvester Overview.mp420.45 MB
 005 Phishing Attack.mp429.19 MB
 006 Phishing Attack Consequences.mp427.32 MB
 004 Spear-phishing Attack.mp441.59 MB
 001 Introduction to Social Engineering and information Gathering.mp418.98 MB
 007 Mass mailer Attack.mp432.15 MB
 002 Types of Social Engineering.mp411.81 MB
 003 Social Engineering attacks.mp419.02 MB
 003 Dangerous viruses of all time.mp413.41 MB
 002 Types of Computer Malwares.mp420.45 MB
 001 Introduction to Computer Malwares.mp418.48 MB
 005 Installing Rootkit Hunter.mp430.89 MB
 004 Some Prominent Dangerous viruses of all time.mp416.94 MB
 004 Backdoor - Maitaining Access.mp432.09 MB
 003 Backdoor - Gaining Access.mp444.03 MB
 005 Backdoor - Maitaining Access Continued.mp425.84 MB
 006 Introducing Command prompt backdoor.mp436.65 MB
 008 Meterpreter Backdoor.mp447.12 MB
 002 Backdoor Process and Functions.mp440.81 MB
 007 Command prompt backdoor Details.mp433.49 MB
 001 Backdoor Overview.mp438.06 MB
 007 Introduction to Java Applet Attack Method.mp422.2 MB
 003 Hacking win7 SAM database.mp464.41 MB
 002 Forensic escaping.mp430.47 MB
 001 I am Root.mp467.26 MB
 004 Jack the ripper.mp456.91 MB
 005 Meterpreter commands.mp449.82 MB
 009 MITM Attack.mp415.15 MB
 008 Java Applet Attack Method Continues.mp454.39 MB
 006 PDF embedded Trojan Horse.mp448.1 MB
 010 ARP Poisoning.mp417.53 MB
 003 Advanced Concepts on DNS spoofing.mp439.84 MB
 002 DNS spoofing.mp426.03 MB
 005 Port Stealing.mp429.33 MB
 004 DHCP Spoofing.mp420.05 MB
 001 DNS spoofing vs DNS poisoning.mp414.47 MB
 001 Introduction to ICMP redirection.mp416.09 MB
 002 ICMP redirection Visual Chart.mp424.29 MB
 003 ICMP redirection Process and Functions.mp419.3 MB
 003 Driftnet.mp441.86 MB
 004 Introducing EvilGrade.mp430.35 MB
 001 Killing a Network.mp448.73 MB
 005 EvilGrade Continues.mp425.87 MB
 002 Ddosing unauthorised Network.mp431.36 MB
 001 Introduction to DoS.mp435.19 MB
 005 Introduction to DDoSing Windows 7.mp437.62 MB
 004 Preventing DDoS Attacks.mp420.44 MB
 003 Levels of Ddos Attacks.mp412.32 MB
 002 DoS vs DDoS.mp49.92 MB
 006 DDoSing Windows 7 methods.mp434.91 MB
 001 Introduction to Hacking.mp422.23 MB
 002 Hacking through Android.mp428.41 MB
 003 Hacking Android via Kali Linux.mp443.33 MB
 008 Generating wordlist Overview.mp429.59 MB
 007 Linux Hash Cracking Strategy.mp459.53 MB
 009 Generating wordlist Process and Functions.mp442.94 MB
 010 CeWL cracking.mp424.45 MB
 001 Introduction to Password Cracking.mp432.76 MB
 006 Introduction to Linux Hash Cracking.mp440.16 MB
 003 Password cracking Strategy shown in Practicals.mp426.16 MB
 005 Nuts and Bolts of Windows Password cracking Strategy.mp441.66 MB
 004 Windows Password cracking Overview.mp441.11 MB
 002 Password cracking Strategy.mp430.35 MB
 004 Wireless cracking Overview.mp428.68 MB
 005 Wireless cracking via Kali Linux.mp423.96 MB
 003 802.1X standard.mp416.7 MB
 002 WPA Continues.mp421.98 MB
 001 WEP and WPA.mp419.89 MB
 001 Meterpreter Overview.mp461 MB
 002 Activating Payloads.mp453.49 MB
 005 Generating payloads.mp466.31 MB
 004 Payloads.mp431.11 MB
 002 Msfconsole commands.mp447.22 MB
 001 Msfconsole explained.mp448.96 MB
 003 Exploits.mp458.31 MB
 003 SQL mapping via Kali Linux.mp426.23 MB
 004 Gathering Password and cracking the hash.mp421.28 MB
 001 Intro to SQL injection.mp411.09 MB
 002 SQL injection to google dorks.mp428.1 MB
 005 Pros and Cons of Cryptography.mp427.65 MB
 001 Introduction to Cryptography.mp423.02 MB
 004 Birthday Theorem Digital Signature.mp422.24 MB
 003 Hash Func and Oracle Method.mp417.12 MB
 002 Basic Concepts on Cryptography.mp420.48 MB
 003 Exporting Databases shown in Practicals.mp419.65 MB
 001 Importing Databases.mp429.33 MB
 002 Exporting Databases.mp422.66 MB

Description

DONT FORGET TO SEED!

UPDATE!!! i have purchased a seedbox and currently it is seeding. if you feel the need to donate to me for my seedbox and everything (because the seedbox costs money) feel free to message me. if not, enjoy!

The following is from the course description:

Kali Linux is specifically tailored to the needs of penetration testing professionals. Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools aimed at various information security tasks, such as Penetration Testing, Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by Offensive Security.

Kali Linux will prepare you to enter the world of professional hacking by ensuring that you are well versed with the skills needed and tools used to compromise the security of enterprise networks and information systems. It is no longer sufficient to merely rely on traditional security measures. In order to ensure the security of critical information assets, it is essential to become familiar with the strategies, tactics, and techniques that are used by actual hackers who seek to compromise your network.

What are the requirements?

Basic understanding of Linux
A PC with internet
TCP/IP will be helpful
What am I going to get from this course?

Over 119 lectures and 18 hours of content!
Learn Kali Linux in details starting from scratch
Analyze Cross-Site Request Forgery attacks to defend your system against them
Safeguard user credentials by figuring out how Bruteforcing works
Many advanced techniques are addressed
What is the target audience?

Anybody interested in information security, penetration testing or ethical hacking
Web Developers
Linux users
IT Professionals

Sharing Widget


Download torrent
3.72 GB
seeders:1
leechers:0
Kali Linux - Complete Training Program from Scratch

All Comments

Thanks a lot....