Kali Linux for Ethical Hacking

(KALI-HACK.AW1) / ISBN : 978-1-64459-682-1
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

About This Course

Skills You’ll Get

1

Preface

2

Foundations of Ethical Hacking and Kali Linux

  • Introduction
  • Ethical hacking overview
  • Kali Linux: A powerful penetration testing platform
  • Setting up your Kali Linux environment
  • The ethical hacker's mindset
  • Legal and ethical considerations
  • Conclusion
3

Information Gathering and Network Scanning

  • Introduction
  • Passive information-gathering techniques
  • Active information gathering techniques
  • Network scanning and enumeration
  • Working with Nmap and other scanning tools
  • DNS enumeration and zone transfers
  • Social engineering techniques
  • Conclusion
4

Executing Vulnerability Assessment

  • Introduction
  • Understanding vulnerabilities
  • Hardware vulnerabilities
  • Network vulnerabilities
  • Human vulnerabilities
  • Vulnerability scanning tools
  • Manual vulnerability assessment techniques
  • Interpreting and prioritizing assessment results
  • Risk assessment and management
  • Vulnerability databases and resources
  • Conclusion
5

Exploitation Techniques

  • Introduction
  • Exploitation frameworks in Kali Linux
  • Working with Metasploit
  • Client-side and web application exploitation
  • Password attacks and brute forcing
  • Exploiting common network services
  • Conclusion
6

Post-Exploitation Activities

  • Introduction
  • Privilege escalation
  • Maintaining persistence and lateral movement
  • Data exfiltration and manipulation
  • Demonstrating data exfiltration and manipulation with Kali Linux
  • Covering your tracks and evading detection
  • Understanding C2 channels
  • Conclusion
7

Wireless Network Security and Exploitation

  • Introduction
  • Wireless networking fundamentals
  • Wireless network vulnerabilities and attacks
  • Tools for wireless network exploitation
  • Defending against wireless attacks
  • Bluetooth and IoT security
  • Design best practices
  • Conclusion
8

Web Application Attacks

  • Introduction
  • Web application security fundamentals
  • Web application attacks and vulnerabilities
  • Web application exploitation tools and techniques
  • Securing web applications
  • API security and testing
  • Secure development best practices
  • Conclusion
9

Hands-on Shell Scripting with Error Debugging Automation

  • Introduction
  • Shell scripting with error debugging automation
  • Bash scripting basics
  • Error handling and debugging
  • Conclusion
10

Real-World Penetration Testing Scenarios

  • Introduction
  • Embarking on practical cybersecurity expeditions
  • Planning and scoping a penetration test
  • Conducting the engagement
  • Reporting and remediation
  • Lessons learned and ongoing improvement
  • Red team vs. Blue team exercises
  • Continuous security monitoring and testing
  • Navigating the endless cyber frontier
  • Conclusion

Kali Linux for Ethical Hacking

$279.99

Buy Now

Related Courses

All Course
scroll to top