Featured! - 76%

Ethical Hacking using Kali Linux from A to Z Course – Mohamed Atef

Add your review

Original price was: $150.00.Current price is: $36.00.

(-76%)
SAVE MORE 70% Ethical Hacking using Kali Linux from A to Z Course – Mohamed Atef course Full content with 30% price as sale page. After purchasing a course from WSOlib, you will get the download link using lifetime.

Salepage link: At HERE. Archive:

Ethical Hacking using Kali Linux from A to Z Course - Mohamed AtefEthical Hacking using Kali Linux from A to Z Course – Mohamed Atef


Learn Ethical Hacking using Kali from Scratch

The course designed for anyone who want to learn Ethical Hacking from scratch using Kali Linux and moving to the world of professional penetration testing.

The course introduces students to the latest ethical hacking tools and techniques, including a teasing lab for practicing different attacks. Students will simulates a full penetration test from A to Z.

Ethical Hacking using Kali from A to Z is a realistic security course, . This advanced penetration testing course requires practice, testing, and the ability to want to learn in a manner that will grow your career in the information security field.

Enrolled students will receive every month a virtual machine or remote lab access or a link to a local web application as a challenge and will be requested to try to hack it, this will keep them involve in Ethical Hacking until they reach a stage where they can do that in a real environment.

Lifetime support – Download unlimited when you buy Ethical Hacking using Kali Linux from A to Z Course – Mohamed Atef Course at CourseAvai. The market leader in online learning – Offers a variety of diverse topics: Internet Marketing, Forex & Trading, NLP & Hypnosis, SEO – Traffic, …

Course Curriculum

Materials and extra resources

  • How to get access to the students portal (3:28)

Introduction

  • Kali Linux Course Introduction (11:31)

Setup Your Lab

  • Build your lab (3:58)
  • Setting up your virtual lab (14:30)
  • Setting up your workspace (3:39)

Getting Comfortable with Kali Linux

  • Penetration Testing Phases (4:51)
  • Kali Linux (8:18)
  • Finding Your Way Around Kali (4:41)
  • Update-Upgrade-Kali-linux (3:38)
  • Find, Locate (6:35)

Managing Kali Linux Services

  • HTTP Service (3:59)
  • SSH Service (3:30)

Essential Tools

  • Netcat (7:55)
  • Grabing the baneer (2:19)
  • Transfering Files using Netcat (4:55)
  • Remote Adminitration using Netcat (2:42)
  • WireShark (4:41)
  • Analysis WireShark traffic in a simple way (5:51)
  • Another WireShark Example (4:10)

Passive Information Gathering

  • Gather Passive Information (5:35)
  • Easy Way to get crtical information (5:54)
  • Passive Information 1 (11:28)
  • Gathering Personal Information (7:34)
  • Maltego (1:48)
  • Using Maltego (8:09)
  • Related Entities in Maltego (3:47)
  • More Maltego (6:01)
  • Google Hacking (6:54)
  • Google Search Operator (4:15)

Active Information Gathering

  • NMAP (10:15)
  • Sweeping the network (4:10)
  • Get more details about the victim (7:11)
  • NMAP NSE Scripts (1:35)
  • Zenmap (5:39)
  • SMB Enumeration (6:14)
  • SMB Null Session (6:48)
  • DNS Enumeration (2:22)
  • DNS Zone Transfer (6:14)
  • Enum4Linux (3:01)

Password Attacks

  • Password attack (5:59)
  • XHydra (7:28)
  • SSH Cracking (3:24)
  • Ncrack (8:40)
  • Ncrack Different OS (4:02)
  • Use The right Wordlist (4:28)
  • Crunch (5:59)
  • The Most amazing and effective Wordlist (6:18)
  • Final Word about Password attack (2:21)

Web Application Attacks

  • SQL Injection Introduction (2:23)
  • What is SQL Injection (9:48)
  • Setup your web application lab (9:50)
  • Is The site infected with SQLI (4:42)
  • The Amazing SQLMAP (10:22)
  • Live Example (6:59)

Network Attacks

  • Introduction to Network Attacks (9:28)
  • Enable Routing (3:32)
  • MITM attack using ettercap (8:08)
  • Start Xplico (1:41)
  • Ettercap and Xplico attack (9:29)
  • WireShark and Xplico (10:00)
  • DNS Spoofing (10:56)
  • DNS Spoofing attack (10:02)

Social Engineering

  • Social Engineering Introduction (5:11)
  • Spoofed Email (7:07)
  • Social Engineering Toolkit (5:03)
  • Fixing Set (5:08)
  • Credential Harvest (11:10)
  • Another-SET-Attack-1 (8:12)
  • Another-SET-Attack-2 (5:38)
  • Meterpreter Sessions (6:57)

Working with Exploit

  • Working with exploit (4:31)
  • Metasploit (7:29)
  • Using Meterpreter session (3:23)
  • Armitage (2:44)
  • Fixing armitage (4:38)
  • Armitage in Action (7:43)
  • Different Armitage usage (9:52)
  • Armitage Example 2 (7:33)
  • Network Penetration using Armitage (2:14)

Remote attacks

  • Port Forwarding (9:24)
  • Hacking Remotely Deonstration (11:39)
GET MORE ...
Since we have a lot of courses in stock, if you cannot find your favorite course, please let us know. To search for other courses and discounts available, let's have a conversation! What are you waiting for?

Here's an overview of the prominent keywords and a list of famous authors:

Business and Sales: Explore business strategies, sales skills, entrepreneurship, and brand-building from authors like Joe Wicks, Jillian Michaels, and Tony Horton.

Sports and Fitness: Enhance athleticism, improve health and fitness with guidance from experts like Shaun T, Kayla Itsines, and Yoga with Adriene.

Personal Development: Develop communication skills, time management, creative thinking, and enhance self-awareness from authors like Gretchen Rubin, Simon Sinek, and Marie Kondo.

Technology and Coding: Learn about artificial intelligence, data analytics, programming, and blockchain technology from thought leaders like Neil deGrasse Tyson, Amy Cuddy, and Malcolm Gladwell.

Lifestyle and Wellness: Discover courses on holistic health, yoga, and healthy living from authors like Elizabeth Gilbert, Bill Nye, and Tracy Anderson.

Art and Creativity: Explore the world of art, creativity, and painting with guidance from renowned artists like Bob Ross and others.

All the courses on WSOlib are led by top authors and experts in their respective fields. Rest assured that the knowledge and skills you acquire are reliable and highly applicable.

Specification: Ethical Hacking using Kali Linux from A to Z Course – Mohamed Atef

Status

User Reviews

0.0 out of 5
0
0
0
0
0
Write a review

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Original price was: $150.00.Current price is: $36.00.

PURCHASE THIS COURSE, YOU ACCUMLATE: 36 POINTs!


Add to wishlistAdded to wishlistRemoved from wishlist 0
Add to compare
Top offers
Original price was: $995.00.Current price is: $99.00.
Original price was: $497.00.Current price is: $69.00.
Original price was: $6,999.00.Current price is: $199.00.
Original price was: $199.00.Current price is: $49.00.
Original price was: $99.00.Current price is: $39.00.
Ethical Hacking using Kali Linux from A to Z Course – Mohamed Atef
Ethical Hacking using Kali Linux from A to Z Course – Mohamed Atef

Original price was: $150.00.Current price is: $36.00.

WSO.lib
Logo
Compare items
  • Total (0)
Compare
0
Shopping cart