- Business
- Esoteric
- Fitness & Gym
- Health
- Hypnosis
- Management
- Marketing & Selling
- Massage – SPA
- Parenting
- PUA Seduction
- Science
- Self Improvement
- Art
- Investing
- Painting & Skulping
- Tai Chi & Martial Arts
- Qigong
- Taoism
- Design & Graphics
- Medicine
- Exams
- Spirituality & Religion
- Hobbies & Fixing & Woodworking
- Photography & Film Making
- Networking & Lan
- Forex & Trading
- IQ & Memory
- Vision & Eye Care
- Swimming & Scuba diving & Water Sports
- Security & Hacking
- Travel
- Cooking
- Driving & Flighting
- Languages
- Computers & Programming
- Building & Home Improvement
- Music
- Astronomy
- History
- Mathematics
- Philosophy
- Literature & Writing
- Economics & Finance
- Sewing
- Hunting
- Electronics
- Psychology & Psychiatry
Description
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + .srt | Duration: 14 lectures (3h 50m) | Size: 1.77 GB
Genre: eLearning | Language: English + .srt | Duration: 14 lectures (3h 50m) | Size: 1.77 GB
Learn from a professional pentester in 2020!
What you’ll learn:
Penetration Testing
Kali Linux
Directory Traversal
SQL Injection
Remote/Local Exploitation
Remote/Local System Enumeration
Privilege Escalation
Nmap
Metasploit
Dirb
Requirements
Basic knowledge of Linux
VirtualBox
Modern laptop or PC (8 GB RAM at least)
Tested on Windows 10, although other OS’s will likely work fine
Passion for cyber security
Description
Welcome everyone, and thanks for choosing to participate in my Kali Linux Hands-on Penetration Testing Labs 4.0 course. If you’ve taken my previous courses with similar names, you already know what’s in store. I’ll be providing a bunch of vulnerable Virtual Machines which we’ll be hacking with Kali Linux using VirutalBox. At the time of this recording, all of the technology is cutting edge, and real-world relevant. Just to give you an idea of what to expect, we’ll be focusing very little on theory, and putting a high emphasis on practical hands-on application of offensive security skills.
For example, we’re going to be utilizing some of the industry standard penetration testing tools such as nmap, Metasploit, dirb, netcat, Burp suite, and a bunch of custom exploits. We’ll be focusing on automated and manual enumeration and exploitation, which is a key essential when training to be a subject matter expert in our field. Some of the attack techniques we’ll be covering are remote web application and service exploitation, privilege escalation, directory traversal, SQL injection, local file inclusion, and much more. If you’re not quite sure what some or any of these words mean, don’t worry, you’ll see soon enough their effectiveness in action.
Each lecture has a set of resources which are included as a text file. In order to access it, simply click on the Resources drop down box for the particular lecture, and download the text file. This includes all commands which are utilized in that specific lecture, as well as URLs which I deem useful.
I really hope that you enjoy my course, and encourage you to reach out to me via the Udemy messaging system either in the Q&A section or direct message if you have any specific technical questions or simply want career advice.
Who this course is for
Cyber security aspirants
Penetration testers
Security analysts
IT Professionals
IT Students
Reviews (0)
Only logged in customers who have purchased this product may leave a review.
Shipping & Delivery
DIGITAL DELIVERY ONLY
This is digital product THE DOWNLOAD LINK SEND 12-24 HOURS AFTER UPON PURSUASE AND PAYMENT CLEARS"
- The digital files are uploaded on PCLOUD
- 12-24 hours delivery time
- the download links expire after 7 days and need to download them
- to renew the download link after expiration have one additional fee $5 per product
REQUESTS
Also we accept requests (in this page) and course exchanges
In Course exchanges we are sending credits only
The credits will be the same price as we can sell course
"REFUNDS & RETURNS"
No Refunds on digital product
ONLY EXCHANGE
- Because of the abuse of the refunds from many customers i don't accept refunds
- We accept only 1 time exchange with product of the same price
- if you done mistake on the exchangeable product i don't recognize it as your mistake
- Exchanges only 3 days after the payment of your digital product. (if abused again i will do it 1 day)
Related products
The Complete Ethical Hacking Masterclass
$10.00
Hacking Buffer Overflow Made Easy
$5.00
Practice Your First Penetration Test: Kali & Metasploit Lab
$5.00
TTC Video – Taking Control of Your Personal Data
$5.00
Getting Started with Reverse Engineering
$5.00
Hacking Wireless Networks. Theory and practice
The Complete Hacking Course – Go from Beginner to Advanced
$5.00
Reviews
There are no reviews yet.