Lynda - Introduction to Kali Linuxseeders: 2
leechers: 9
Lynda - Introduction to Kali Linux (Size: 463.88 MB)
DescriptionKali Linux is a flavor of Linux targeted at digital forensics experts and penetration (pen) testers. It includes over 400 pen-testing programs, and it is the primary tool used by ethical hackers. Using Kali Linux, certified ethical hackers can test networks on their organizations' behalves, to see if they're vulnerable to outside attacks. This course will give prospective ethical hackers a short overview of the tools in Kali Linux. Cybersecurity expert Malcolm Shore shows how to set up a virtual environment for testing, configure Kali Linux, and install toolsets for information gathering, vulnerability assessment, password and hash cracking, and target exploitation. Because businesses are connected, they are also exposed. Vulnerability testing helps organizations limit that exposure. This course will help you explore the careers, techniques, and tools behind ethical hacking—one of the most competitive and sought-after IT security skills. Introduction 1m 50s Welcome 1m 22s What you should know 28s 1. Setting Up the Virtual Lab 32m 6s Introduction to virtualization 5m 28s Setting up a virtual lab 7m 34s Installing virtual machines 8m 11s Installing appliances 3m 15s Getting Metasploitable and Windows VMs 4m 34s Working with advanced configuration in VirtualBox 3m 4s 2. Introducing Kali 15m 17s What is Kali? 2m 13s Explore the quick access list 5m 51s Change screensaver and font settings 1m 53s Explore the applications in Kali 3m 31s Update Kali 1m 49s 3. Information Gathering (Understanding the Target) 13m 41s Reviewing the tools 1m 4s Introducing DMitry 2m 34s Introducing DNSenum 2m 59s Introducing Maltego 7m 4s 4. Vulnerability Analysis 27m 18s Reviewing the tools 46s Introducing Spike 1m 9s Install OpenVAS 2m 57s Run an OpenVAS scan 6m 16s Custom scan with OpenVAS 1m 22s Explore the OpenVAS menu 5m 0s Install Vega 1m 6s Web crawling with Vega 3m 45s Use Vega as a web proxy 4m 19s Review Vega's menus 38s 5. Passwords and Hashes 26m 33s Password testing 6m 32s Use command-line tools 3m 18s Windows Credential Editor 2m 41s Use John the Ripper in Linux 1m 54s Use John for Windows passwords 2m 12s Explore Johnny's options 3m 57s Pass the hash 2m 17s Use rainbow tables 3m 42s 6. Exploiting Targets 23m 7s Overview of exploitation tools 1m 33s Exploit Linux with Metasploit 5m 29s Exploit Windows with Armitage 6m 16s More exploiting with Armitage 2m 45s Pivot through a network 3m 38s Install persistent access 3m 26s Conclusion 59s Next steps 59s Sharing Widget |