End-to-End Penetration Testing with Kali Linux [Video]

Code Files

End-to-End Penetration Testing with Kali Linux [Video]

Sunil Gupta

This course will help you discover the secrets of Pentesting using Linux
Packt Subscription
FREE
$9.99/m after trial
Video
$106.25
RRP $124.99
Save 14%
What do I get with a Packt subscription?
  • Exclusive monthly discount - no contract
  • Unlimited access to entire Packt library of 6500+ eBooks and Videos
  • 120 new titles added every month, on new and emerging tech
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the subscription reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the subscription reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the subscription reader
$0.00
$106.25
$9.99 p/m after trial
RRP $124.99
Subscription
Video
Start a FREE 10-day trial

Frequently bought together


End-to-End Penetration Testing with Kali Linux [Video] Book Cover
End-to-End Penetration Testing with Kali Linux [Video]
$ 124.99
$ 106.25
End-to-End Real-World Application Development with F# [Integrated Course] Book Cover
End-to-End Real-World Application Development with F# [Integrated Course]
$ 124.99
$ 106.25
Buy 2 for $212.50
Save $37.48
Add to Cart

Video Details

ISBN 13 9781789800623
Course Length 7 hours 51 minutes

Table of Contents

Video Description

Kali Linux contains a large number of penetration testing tools from various different niches of the security and forensics fields. Kali Linux offers a multitude of options to scan a single IP, port, or host (or a range of IPs, ports, and hosts) and discover vulnerabilities and security holes. This output and information can serve as a precursor to penetration testing efforts. In this course, you will perform tests to carry out and exploit hidden vulnerabilities within your network and systems; you will not only expose these but will also provide ways and methods to fix, secure, and harden your system's security, protecting it against any other attacks.
You will learn how to test your network against various types of attack and develop a network-testing environment that can be used to test scanning tools and techniques. Employ methods effectively used by real hackers to ensure the most effective penetration testing of your network; select and configure the most effective tools from Kali Linux to test network security; employ stealth to avoid detection in the network being tested; and recognize when stealthy attacks are being used against your network. Exploit networks and data systems using wired and wireless networks as well as web services. Identify and download valuable data from target systems and learn to maintain access on compromised systems. Use social engineering to compromise the weakest part of the network—the end users. Use port scanning for UDP scanning, stealth scanning, and connect/zombie scanning using pentesting tools. You will learn how to utilize the arsenal of tools available in Kali Linux to conquer any network environment.
By the end of this course, you will be a pro with the Kali Linux tools you need to perform advanced penetration testing; you will know how to exploit vulnerable systems and how to patch them.

Style and Approach

To hit the market’s demand this course is designed for Freshers and professionals to elevate their skills in Kali Linux. Possessing the importance of learner’s time and goals we will emphasize on complete illustration.

Video Preview

What You Will Learn

  • Learn Various Information Gathering tools techniques. 
  • Perform Network and Web Vulnerability Analysis. 
  • Learn Database Pentesting Techniques
  • Perform Password Cracking Techniques 
  • Wifi hacking to learn wireless penetration techniques
  • Learn MITM and Social Engineering Attack 
  • Perform Exploitation and Post Exploitation Attack 
  • Learn to Generate Final Reports of Penetration Testing

Authors

Table of Contents

Video Details

ISBN 139781789800623
Course Length7 hours 51 minutes
Read More

Read More Reviews

Recommended for You

End-to-End Real-World Application Development with F# [Integrated Course] Book Cover
End-to-End Real-World Application Development with F# [Integrated Course]
$ 124.99
$ 106.25
Hands-On AWS Penetration Testing with Kali Linux Book Cover
Hands-On AWS Penetration Testing with Kali Linux
$ 35.99
$ 25.20
End to End GUI development with Qt5 Book Cover
End to End GUI development with Qt5
$ 79.99
$ 56.00
Practical Web App Pentesting with Kali Linux [Video] Book Cover
Practical Web App Pentesting with Kali Linux [Video]
$ 124.99
$ 106.25
Perfect 3 Days Linux Course [Video] Book Cover
Perfect 3 Days Linux Course [Video]
$ 183.99
$ 156.40
Learning Windows Penetration Testing Using Kali Linux [Video] Book Cover
Learning Windows Penetration Testing Using Kali Linux [Video]
$ 124.99
$ 106.25