CG数据库 >> Hands-On Infrastructure Penetration Testing

$125 | Duration: 2h 37m | Video: h264, 1920×1080 | Audio: AAC, 48kHz, 2 Ch | 489 MBGenre: eLearning | Language: English | January 31, 2019A one-stop solution to protect your network devices and modern operating systems from attacks using Kali LinuxVideo DescriptionAre you a system administrator, penetration tester, or network engineer and do you want to take your penetration testing skills to the next level? Then this course is for you.

It is your one-stop solution to safeguarding complex network devices and modern operating systems from external threats using Kali Linux.

This course will provide you with advanced penetration testing techniques with Kali Linux that will help you exploit databases and web/applications servers and perform network penetration.

With this course, you will prevent your system from being exploited by using techniques such as reverse shells.

Moving on, this course will not only walk you through managing vulnerabilities but will also show you how to protect endpoints.

You will explore web pentesting, learn how to set up your LAB environment, and explore the various vulnerabilities that exist nowadays.

Towards the end of this course, you will also perform wireless penetration testing to defend against the wireless assets.

Finally, you will have mastered the skills and methodologies you need to breach infrastructures and provide complete endpoint protection for your system via Kali Linux.

All the code and supporting files for this course are available from Github atStyle and ApproachThis comprehensive course takes you through penetration testing with Kali Linux and is packed with step-by-step instructions and working examplesTable of ContentsLAB SETUP AND OVERVIEWEXPLORE PENETRATION TESTINGAVOID SYSTEM EXPLOITATIONSINTRODUCTION TO WEBSITE PENETRATION TESTINGPERFORM NETWORK PENETRATION TESTINGWhat You Will LearnSet up your environment for performing penetration testing using Kali LinuxCreate a persistent reverse shellPerform penetration testing on your websitesPerform de-authentication attacks on Wi-Fi routersUse GPU power for hacking WPA2 Wi-Fi routersAuthorsParvinder YadavParvinder Yadav has worked with wireless penetration testing for more than 4 years and has a deep knowledge of networking.

He has created a lot of projects such as a Wi-Fi jammer using shell scripting and the Raspberry Pi 2; a portable hacking device which just weighs 100 grams and can hack almost any Wi-Fi router; a portable wireless CCTV camera (using the Raspberry Pi) that is the same size as a mobile; a portable media server; a radio station using the Raspberry Pi; and a lot more.

He is the author of PNPtutorials, he is a geeky YouTuber and a Tech-Freak, and has more than 55K subscribers to his channel on YouTube.


Hands-On Infrastructure Penetration Testing的图片1
Hands-On Infrastructure Penetration Testing的图片2