udemy - Kali Linux - Complete Training Program from Scratch

seeders: 49
leechers: 63
Added on August 24, 2015 by gewdlookingin Other > Tutorials
Torrent verified.



udemy - Kali Linux - Complete Training Program from Scratch (Size: 3.72 GB)
 Lecture 02 - What is Ethical hacking and Penetration testing.mp427.65 MB
 Lecture 01 - Introduction.mp417.7 MB
 Lecture 09 - Installing Kali Linux on MacBook.mp450.37 MB
 Lecture 03 - Kali Linux.mp446.94 MB
 Lecture 08 - Configuring Kali Linux.mp444.86 MB
 Lecture 07 - Installing vmware tools.mp433.1 MB
 Lecture 05 - Concepts on Operating systems.mp424.94 MB
 Lecture 06 - Installing Operating Systems.mp419.56 MB
 Lecture 04 - Operating systems Overview.mp414.95 MB
 Lecture 12 - Footprinting Tools.mp463.19 MB
 Lecture 23 - Introduction to Nmap and ZenMap.mp450.84 MB
 Lecture 24 - Nmap.mp446.58 MB
 Lecture 25 - ZenMap.mp443.89 MB
 Lecture 16 - Who is lookup.mp436.4 MB
 Lecture 19 - Determining Operation System.mp435.06 MB
 Lecture 22 - Connecting information database.mp434 MB
 Lecture 14 - Nuts and Bolts of Google Hacking.mp431.94 MB
 Lecture 20 - Introduction to Phishing Attacks.mp430.73 MB
 Lecture 13 - Introduction to Google Hacking.mp427.15 MB
 Lecture 32 - DNSrecon.mp442.18 MB
 Lecture 28 - WHO IS and dnsenum Overview.mp439.49 MB
 Lecture 31 - DNSdict.mp439.38 MB
 Lecture 33 - DNSmapping.mp434.98 MB
 Lecture 30 - URLcrazy.mp433.23 MB
 Lecture 27 - The Harvester Process and Functions.mp426.42 MB
 Lecture 29 - DNSenum.mp426 MB
 Lecture 26 - The Harvester Overview.mp420.45 MB
 Lecture 37 - Spear-phishing Attack.mp441.59 MB
 Lecture 40 - Mass mailer Attack.mp432.15 MB
 Lecture 38 - Phishing Attack.mp429.19 MB
 Lecture 39 - Phishing Attack Consequences.mp427.32 MB
 Lecture 36 - Social Engineering attacks.mp419.02 MB
 Lecture 34 - Introduction to Social Engineering and information Gathering.mp418.98 MB
 Lecture 35 - Types of Social Engineering.mp411.81 MB
 Lecture 45 - Installing Rootkit Hunter.mp430.89 MB
 Lecture 42 - Types of Computer Malwares.mp420.45 MB
 Lecture 41 - Introduction to Computer Malwares.mp418.48 MB
 Lecture 44 - Some Prominent Dangerous viruses of all time.mp416.94 MB
 Lecture 43 - Dangerous viruses of all time.mp413.41 MB
 Lecture 53 - Meterpreter Backdoor.mp447.12 MB
 Lecture 48 - Backdoor - Gaining Access.mp444.03 MB
 Lecture 47 - Backdoor Process and Functions.mp440.81 MB
 Lecture 46 - Backdoor Overview.mp438.06 MB
 Lecture 51 - Introducing Command prompt backdoor.mp436.65 MB
 Lecture 52 - Command prompt backdoor Details.mp433.49 MB
 Lecture 49 - Backdoor - Maitaining Access.mp432.09 MB
 Lecture 50 - Backdoor - Maitaining Access Continued.mp425.84 MB
 Lecture 54 - I am Root.mp467.26 MB
 Lecture 56 - Hacking win7 SAM database.mp464.41 MB
 Lecture 57 - Jack the ripper.mp456.91 MB
 Lecture 61 - Java Applet Attack Method Continues.mp454.39 MB
 Lecture 58 - Meterpreter commands.mp449.82 MB
 Lecture 59 - PDF embedded Trojan Horse.mp448.1 MB
 Lecture 55 - Forensic escaping.mp430.47 MB
 Lecture 60 - Introduction to Java Applet Attack Method.mp422.2 MB
 Lecture 63 - ARP Poisoning.mp417.53 MB
 Lecture 62 - MITM Attack.mp415.15 MB
 Lecture 66 - Advanced Concepts on DNS spoofing.mp439.84 MB
 Lecture 68 - Port Stealing.mp429.33 MB
 Lecture 65 - DNS spoofing.mp426.03 MB
 Lecture 67 - DHCP Spoofing.mp420.05 MB
 Lecture 64 - DNS spoofing vs DNS poisoning.mp414.47 MB
 Lecture 70 - ICMP redirection Visual Chart.mp424.29 MB
 Lecture 71 - ICMP redirection Process and Functions.mp419.3 MB
 Lecture 69 - Introduction to ICMP redirection.mp416.09 MB
 Lecture 72 - Killing a Network.mp448.73 MB
 Lecture 74 - Driftnet.mp441.86 MB
 Lecture 73 - Ddosing unauthorised Network.mp431.36 MB
 Lecture 75 - Introducing EvilGrade.mp430.35 MB
 Lecture 76 - EvilGrade Continues.mp425.87 MB
 Lecture 81 - Introduction to DDoSing Windows 7.mp437.62 MB
 Lecture 77 - Introduction to DoS.mp435.19 MB
 Lecture 82 - DDoSing Windows 7 methods.mp434.91 MB
 Lecture 80 - Preventing DDoS Attacks.mp420.44 MB
 Lecture 79 - Levels of Ddos Attacks.mp412.32 MB
 Lecture 78 - DoS vs DDoS.mp49.92 MB
 Lecture 85 - Hacking Android via Kali Linux.mp443.33 MB
 Lecture 84 - Hacking through Android.mp428.41 MB
 Lecture 83 - Introduction to Hacking.mp422.23 MB
 Lecture 92 - Linux Hash Cracking Strategy.mp459.53 MB
 Lecture 94 - Generating wordlist Process and Functions.mp442.94 MB
 Lecture 90 - Nuts and Bolts of Windows Password cracking Strategy.mp441.66 MB
 Lecture 89 - Windows Password cracking Overview.mp441.11 MB
 Lecture 91 - Introduction to Linux Hash Cracking.mp440.16 MB
 Lecture 86 - Introduction to Password Cracking.mp432.76 MB
 Lecture 87 - Password cracking Strategy.mp430.35 MB
 Lecture 93 - Generating wordlist Overview.mp429.59 MB
 Lecture 88 - Password cracking Strategy shown in Practicals.mp426.16 MB
 Lecture 95 - CeWL cracking.mp424.45 MB
 Lecture 99 - Wireless cracking Overview.mp428.68 MB
 Lecture 100 - Wireless cracking via Kali Linux.mp423.96 MB
 Lecture 97 - WPA Continues.mp421.98 MB
 Lecture 96 - WEP and WPA.mp419.89 MB
 Lecture 98 - 802.1X standard.mp416.7 MB
 Lecture 101 - Meterpreter Overview.mp461 MB
 Lecture 102 - Activating Payloads.mp453.49 MB
 Lecture 107-108 - Generating payloads.mp466.31 MB
 Lecture 105 - Exploits.mp458.31 MB
 Lecture 103 - Msfconsole explained.mp448.96 MB
 Lecture 104 - Msfconsole commands.mp447.22 MB
 Lecture 106 - Payloads.mp431.11 MB
 Lecture 110 - SQL injection to google dorks.mp428.1 MB
 Lecture 111 - SQL mapping via Kali Linux.mp426.23 MB
 Lecture 112 - Gathering Password and cracking the hash.mp421.28 MB
 Lecture 109 - Intro to SQL injection.mp411.09 MB
 Lecture 117 - Pros and Cons of Cryptography.mp427.65 MB
 Lecture 113 - Introduction to Cryptography.mp423.02 MB
 Lecture 116 - Birthday Theorem Digital Signature.mp422.24 MB
 Lecture 114 - Basic Concepts on Cryptography.mp420.48 MB
 Lecture 115 - Hash Func and Oracle Method.mp417.12 MB
 Lecture 118 - Importing Databases.mp429.33 MB
 Lecture 119 - Exporting Databases.mp422.66 MB
 Lecture 120 - Exporting Databases shown in Practicals.mp419.65 MB

Description

udemy

Title: Kali Linux - Complete Training Program from Scratch
by iCodeiLearn Academy

Level: All Levels
Duration: 18 hours

Course Description
Kali Linux is specifically tailored to the needs of penetration testing professionals. Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools aimed at various information security tasks, such as Penetration Testing, Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by Offensive Security.

Kali Linux will prepare you to enter the world of professional hacking by ensuring that you are well versed with the skills needed and tools used to compromise the security of enterprise networks and information systems. It is no longer sufficient to merely rely on traditional security measures. In order to ensure the security of critical information assets, it is essential to become familiar with the strategies, tactics, and techniques that are used by actual hackers who seek to compromise your network.

What are the requirements?
Basic understanding of Linux
A PC with internet
TCP/IP will be helpful

What am I going to get from this course?
Over 120 lectures and 18 hours of content!
Learn Kali Linux in details starting from scratch
Analyze Cross-Site Request Forgery attacks to defend your system against them
Safeguard user credentials by figuring out how Bruteforcing works
Many advanced techniques are addressed

What is the target audience?
Anybody interested in information security, penetration testing or ethical hacking
Web Developers
Linux users
IT Professionals
Curriculum

Sharing Widget


Download torrent
3.72 GB
seeders:49
leechers:63
udemy - Kali Linux - Complete Training Program from Scratch