lynda Introduction to Kali Linux
Description:
Kali Linux is a taste of Linux targeted at digital forensics experts as well as infiltration (pen) testers. It includes over 400 pen-testing programs, and also it is the primary device used by honest cyberpunks. Utilizing Kali Linux, certified ethical cyberpunks can check networks on their organizations’ behalves, to see if they’re prone to outside strikes.
This program will give possible honest hackers a brief summary of the tools in Kali Linux. Cybersecurity professional Malcolm Shore demonstrates how to establish a digital atmosphere for screening, set up Kali Linux, as well as mount toolsets for info gathering, vulnerability analysis, password and also hash cracking, and target exploitation.
Because businesses are attached, they are also exposed. Vulnerability testing assists organizations restrict that direct exposure. This course will aid you check out the occupations, methods, and tools behind ethical hacking– among the most affordable and also desired IT security skills.
Topics include:
Overview of Metaploit, Maltego, and Wifite
Setting up a virtual lab with Oracle VM
Installing virtual machines and appliances
Exploring the Kali Linux applications
Gathering information with DMitry and DNSenum
Conducting a vulnerability assessment
Installing OpenVAS and Vega
Testing passwords
Exploiting targets
Kali Linux is a taste of Linux targeted at digital forensics experts as well as infiltration (pen) testers. It includes over 400 pen-testing programs, and also it is the primary device used by honest cyberpunks. Utilizing Kali Linux, certified ethical cyberpunks can check networks on their organizations’ behalves, to see if they’re prone to outside strikes.
This program will give possible honest hackers a brief summary of the tools in Kali Linux. Cybersecurity professional Malcolm Shore demonstrates how to establish a digital atmosphere for screening, set up Kali Linux, as well as mount toolsets for info gathering, vulnerability analysis, password and also hash cracking, and target exploitation.
Because businesses are attached, they are also exposed. Vulnerability testing assists organizations restrict that direct exposure. This course will aid you check out the occupations, methods, and tools behind ethical hacking– among the most affordable and also desired IT security skills.
Topics include:
Overview of Metaploit, Maltego, and Wifite
Setting up a virtual lab with Oracle VM
Installing virtual machines and appliances
Exploring the Kali Linux applications
Gathering information with DMitry and DNSenum
Conducting a vulnerability assessment
Installing OpenVAS and Vega
Testing passwords
Exploiting targets