$125 | Duration: 2h 37m | Video: h264, 1920x1080 | Audio: AAC, 48kHz, 2 Ch | 489 MB
Genre: eLearning | Language: English | January 31, 2019
A one-stop solution to protect your network devices and modern operating systems from attacks using Kali Linux
Video Description
Are you a system administrator, penetration tester, or network engineer and do you want to take your penetration testing skills to the next level? Then this course is for you. It is your one-stop solution to safeguarding complex network devices and modern operating systems from external threats using Kali Linux.
This course will provide you with advanced penetration testing techniques with Kali Linux that will help you exploit databases and web/applications servers and perform network penetration. With this course, you will prevent your system from being exploited by using techniques such as reverse shells. Moving on, this course will not only walk you through managing vulnerabilities but will also show you how to protect endpoints. You will explore web pentesting, learn how to set up your LAB environment, and explore the various vulnerabilities that exist nowadays. Towards the end of this course, you will also perform wireless penetration testing to defend against the wireless assets.
Finally, you will have mastered the skills and methodologies you need to breach infrastructures and provide complete endpoint protection for your system via Kali Linux.
All the code and supporting files for this course are available from Github at
Style and Approach
This comprehensive course takes you through penetration testing with Kali Linux and is packed with step-by-step instructions and working examples
Table of Contents
LAB SETUP AND OVERVIEW
EXPLORE PENETRATION TESTING
AVOID SYSTEM EXPLOITATIONS
INTRODUCTION TO WEBSITE PENETRATION TESTING
PERFORM NETWORK PENETRATION TESTING
What You Will Learn
Set up your environment for performing penetration testing using Kali Linux
Create a persistent reverse shell
Perform penetration testing on your websites
Perform de-authentication attacks on Wi-Fi routers
Use GPU power for hacking WPA2 Wi-Fi routers
Authors
Parvinder Yadav
Parvinder Yadav has worked with wireless penetration testing for more than 4 years and has a deep knowledge of networking. He has created a lot of projects such as a Wi-Fi jammer using shell scripting and the Raspberry Pi 2; a portable hacking device which just weighs 100 grams and can hack almost any Wi-Fi router; a portable wireless CCTV camera (using the Raspberry Pi) that is the same size as a mobile; a portable media server; a radio station using the Raspberry Pi; and a lot more. He is the author of PNPtutorials, he is a geeky YouTuber and a Tech-Freak, and has more than 55K subscribers to his channel on YouTube.
发布日期: 2019-02-02