Wait a minute..

Basic Hacking with Kali Linux

This course is designed for aspiring cybersecurity workers whose jobs are to perform penetration testing and look for security vulnerabilities or for students who want to learn how to do penetration testing with Kali Linux .

Self Paced Class
Beginner 5(1 Ratings)
Created by Hacktrace Indonesia
What will I learn?
  • Learn Ethical Hacking from scratch & All 5 phases of Penetration Testing
  • Understand the most common Linux commands used by hackers
  • The Metasploit Framework Essentials
  • Understand how to attack Wi-Fi and how to mitigate
  • Perform in a hacking-challenge on our webserver
  • Understand how dangerous a client-side attack is.

Curriculum for this course
26 Lessons 07:51:07 Hours
Course Preview
1 Lessons
  • Overview
  • Preparation
  • Cybersecurity Fundamental
  • Security Assessment
  • Introduction to Linux
  • Introduction to Kali Linux
  • Basic Command Shell
  • Information Gathering with Kali Linux
  • Passive Information Gathering
  • OSINT in Information Gathering
  • Using Active Information Gathering
  • Vulnerability Scanning
  • Identify Vulnerability and Exploit
  • Metasploit
  • Metasploit Exercise
  • Web Application Attacks
  • Bruteforce and Password Attack
  • Backdooring System
  • Msfvenom
  • File Transfer
  • Privilege Escalation
  • Client Side Attack
  • Steganography
  • WiFi Hacking
  • Secure and Anonymous using Tor, Proxy Chains
  • Practice on Hacktrace-Ranges
Requirements
  • No prior knowledge about kali linux required
  • Desire to become and ethical hacker and willingness to learn and persevere
  • Computer with a minimum of 4GB ram/memory
  • A strong desire to understand hacker tools and techniques
+ View more
Description

This course is designed for aspiring cybersecurity workers whose jobs are to perform penetration testing and look for security vulnerabilities or for students who want to learn how to do penetration testing with Kali Linux . Participants will have knowledge of basic penetration testing and the ability to find vulnerabilities and exploit them using the Kali Linux operating system.

+ View more
Other related courses

Student feedback
5
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 100%
Reviews
  • Thu, 24-Nov-2022
    Aufar Dzulfiqar
    Penyampaian Materi nya sangat jelas
Rp 500.000
Buy now
This course includes :
  • 8 Hours On-demand video
  • Hacking Lab Practice
  • 1 Year Access
  • Certificate of Completion
Ask our team
Rp 500.000
Buy now
This course includes :
  • 8 Hours On-demand video
  • Hacking Lab Practice
  • 1 Year Access
  • Certificate of Completion
Ask our team

Hi, you can chat with me

...