Learning Outcome:
Requirement:
Course Curriculum
Ethical Hacking & Penetration Testing using Kali Linux
Available in
days
days
after you enroll
-
Start
1.1. Introduction to ethical hacking. What is it in detail?
(8:02)
-
Start
1.2. Prerequisites for getting the most out of this course
(7:28)
-
Start
1.3. Basic terminology - white hat, gray hat, and black hat hacking
(12:00)
-
Start
1.4. Basic terminology - SQL injections, VPN, proxy, VPS, and keyloggers
(18:18)
-
Start
2.1. Installing VirtualBox with RPM and why use a virtual machine
(8:58)
-
Start
2.2. Installing VirtualBox using the default package manager from repositories
(15:01)
-
Start
2.3. Creating the virtual environment
(13:35)
-
Start
2.4. Installing VirtualBox on Windows
(5:16)
-
Start
2.5. Kali Linux installation within a virtual environment
(16:04)
-
Start
2.6. Booting up Kali Linux for the first time
(12:20)
-
Start
2.7. Installing VirtualBox Guest Additions
(14:40)
-
Start
3.1. Introduction to the Linux terminal
(9:35)
-
Start
3.2. Linux command line interface (CLI) basics.
(14:03)
-
Start
3.3. Linux CLI explained in greater detail.
(15:26)
-
Start
4.1. Using Tor to protect your anonymity online
(10:58)
-
Start
4.2. Tor continued
(15:05)
-
Start
5.1. Proxychains for using proxy servers, hiding your IP, and obtaining access
(12:01)
-
Start
5.2. Proxychains - part 2
(14:15)
-
Start
5.3. Proxychains - part 3
(13:18)
-
Start
6.1. Staying anonymous with a virtual private network (VPN)
(6:07)
-
Start
6.2. VPN continued
(12:21)
-
Start
7.1. Macchanger - part 1
(12:23)
-
Start
7.2. Macchanger - part 2
(10:53)
-
Start
8.1. Footprinting with nmap
(17:37)
-
Start
8.2. Nmap continued
(19:22)
-
Start
8.3. External resources using public listings of known vulnerabilities
(10:11)
-
Start1.1. Introduction to ethical hacking. What is it in detail? (8:02)
-
Start1.2. Prerequisites for getting the most out of this course (7:28)
-
Start1.3. Basic terminology - white hat, gray hat, and black hat hacking (12:00)
-
Start1.4. Basic terminology - SQL injections, VPN, proxy, VPS, and keyloggers (18:18)
-
Start2.1. Installing VirtualBox with RPM and why use a virtual machine (8:58)
-
Start2.2. Installing VirtualBox using the default package manager from repositories (15:01)
-
Start2.3. Creating the virtual environment (13:35)
-
Start2.4. Installing VirtualBox on Windows (5:16)
-
Start2.5. Kali Linux installation within a virtual environment (16:04)
-
Start2.6. Booting up Kali Linux for the first time (12:20)
-
Start2.7. Installing VirtualBox Guest Additions (14:40)
-
Start3.1. Introduction to the Linux terminal (9:35)
-
Start3.2. Linux command line interface (CLI) basics. (14:03)
-
Start3.3. Linux CLI explained in greater detail. (15:26)
-
Start4.1. Using Tor to protect your anonymity online (10:58)
-
Start4.2. Tor continued (15:05)
-
Start5.1. Proxychains for using proxy servers, hiding your IP, and obtaining access (12:01)
-
Start5.2. Proxychains - part 2 (14:15)
-
Start5.3. Proxychains - part 3 (13:18)
-
Start6.1. Staying anonymous with a virtual private network (VPN) (6:07)
-
Start6.2. VPN continued (12:21)
-
Start7.1. Macchanger - part 1 (12:23)
-
Start7.2. Macchanger - part 2 (10:53)
-
Start8.1. Footprinting with nmap (17:37)
-
Start8.2. Nmap continued (19:22)
-
Start8.3. External resources using public listings of known vulnerabilities (10:11)
Your Instructor
CIP Cyber
CIP Cyber is an initiative dedicated to protecting critical infrastructure from
cyber threats. Our vision is to empower the cybersecurity community to
defend critical infrastructure, and our mission is to connect, train, and certify
people to protect critical infrastructure.
Reviews
5 months ago Infosec Leader
Exceptionally proficient teacher, who will deliberately disclose everything to guarantee your complete understanding. I appreciated the challenges which were presented with the goal that I could have an opportunity to give it a shot for myself rather than continually following along.
3 months ago Jaysen Batchelor
This course was extremely overwhelming to jump into, however the instructor makes an extraordinary effort in showing step by step explaining you with the devices and strategies at an early stage.
1 months ago Milos Montes
Excellent course.... the instructor helped keep me wanting to continue through all the lectures.
1 months ago Alexey Brenes
This was till now the best course I have had on EH Academy. The instructor does a great job! He teaches with great interest and has a rich educational knowledge.
6 months ago Anthony Falcon
This course is really engaging and the instructor was well prepared to deliver the content effectively.
9 months ago Benjamin Major
The instructor has a strong grasp of the subject and makes the learning fun with his antics. Have enjoyed all of this instructor’s courses.
8 months ago Chad Blair
I really liked this course because the instructor uses very basic but clear models to demonstrate a concept. It really helped me get a picture of what's happening throughout the course.
4 months ago Chris Dunavan
For me this was quite quick, but deep enough, course to get detailed knowledge. This class was very well organized and delivered, I enjoyed it.
3 months ago Cristian Drincu
Excellent!! I would recommend as "A Must" for students who are seeking quality course.
2 months ago Edwin-Torres-Sanchez
This is really good, building from beginner to amateur, so far - I've taken a lot from this course and actually am using the things I learn on a daily basis in my work.
6 months ago Glen Ihrig
The course is really engaging and an experiential learning.
7 months ago Hector-Toledo
Almost done with the course. Excellent all round. The course is well structured and the pace is just correct.
1 months ago Hector-Toledo
The instructor explains clearly each point, and he is concise and to the point. He uses practical and visual approach that makes concepts easy to understand and hard to forget.
2 months ago Juan John Charles
Very engaging presentation and manages to condense a lot of information into short periods but still makes it all understandable.
1 months ago Marcus Smith