What You’ll Discover in Mohamed Atef Ethical Hacking using Kali Linux from A to Z Course
This advanced penetration training course requires practice, testing, as well as the ability to communicate. to You want to Learn in a way that will help you grow in your information security career.
Mohamed Atef – Ethical Hacking using Kali Linux from A to Z Course
Learn Ethical Hacking using Kali from Scratch
The course is designed for anyone who wants it. to Learn Ethical Hacking from scratch using Kali Linux Moving to The world of professional penetration testing
This course introduces students to The latest in ethical hacking tools and techniques will be presented, along with a mock lab to practice different attacks. Students will be able to simulate a complete penetration test. from A to Z.
Ethical Hacking using Kali from A to Z This is a real security course. This advanced penetration testing course is best practiced and tested. to You want to Learn in a way that will help you grow in your information security career.
Every month, students enrolled in the program will be provided with a link or virtual machine access. to A local web application will be required as a challenge. to Try to Hack it. This will keep the participants in Ethical Hacking They will continue to do this until they are able to do it in a real setting.
Buy Unlimited Ethical Hacking using Kali Linux from A to Z Course – Mohamed Atef Course StandBySun. The market leader in online learning – Offers a variety of diverse topics: Internet Marketing, Forex & Trading, NLP & Hypnosis, SEO – Traffic, …
Course Curriculum
Materials and additional resources
How to get access to The students portal (3.28)
Introduction
Kali Linux Course Introduction (11:31).
Install Your Lab
Build your lab (3:58)
Set up your virtual lab (14.30)
Set up your workspace (3.39)
Comfortable living with Kali Linux
Phases of Penetration Testing (4:51)
Kali Linux (8:18)
Finding Your Way Around Kali (4:41)
Up-to-date-Upgrade-Kali-linux (3:38)
Find, Locate (6.35)
Management Kali Linux Services
HTTP Service (3.59)
SSH Service (3:30).
Essential Tools
Netcat (7.55)
Grab the baneer (2.19)
Transfering Files using Netcat (4.55)
Remote Administration using Netcat (2.42)
WireShark (4.41)
Analyze WireShark traffic in a straightforward way (5:51).
Another WireShark Example (4.10)
Passive Information Gathering
Gather passive information (5:35).
Easy Way to Get crtical info (5:54).
Passive Information 1 (11.28)
Collecting Personal Information (7.34)
Maltego (1:48)
Using Maltego (8:09)
Similar Entities in Maltego (3.47)
More Maltego (6:01)
Google Hacking (6:54)
Google Search Operator (4.15)
Download immediately Mohamed Atef – Ethical Hacking using Kali Linux from A to Z Course
Active Information Gathering
NMAP (10.15)
Network sweep (4:10)
Learn more about the victim (7.11)
NMAP NSE scripts (1:35).
Zenmap (5:39)
SMB Enumeration (6.14)
SMB Null Sessions (6:48)
DNS Enumeration (2.22)
DNS Zone Transfer (6.14)
Enum4Linux (3:01)
Password Attacks
Password attack (5:59)
XHydra (7:28)
SSH Cracking (3.24)
Ncrack (8.40)
Ncrack Different OS (4:02)
Use the right Wordlist (4.28)
Crunch (5:59)
The Most powerful and amazing wordlist (6:18).
Final Word on Password attack (2.21)
Web Application Attacks
SQL Injection Introduction (2:23)
What is SQL Injection (9.48)?
Install your web application lab (9.50)
Is your site infected with SQLI (4.42)?
The Amazing SQLMAP (10.22)
Live Example (6.59)
Network Attacks
Introduction to Network Attacks (9:28)
Allow Routing (3.32)
MITM attack using ettercap (8:08)
Start Xplico (1:41)
Ettercap or Xplico attack (9.29)
WireShark (10:00) and Xplico (10:00).
DNS Spoofing (10.56).
DNS Spoofing Attack (10:02)
Social Engineering
Social Engineering Introduction (5:11)
Spoofed email (7:07).
Social Engineering Toolkit (5:03)
Fixing Set (5.08)
Credential Harvest (11:10)
Another-SET-Attack-1 (8:12)
Another-SET-Attack-2 (5:38)
Meterpreter Sessions (6.57)
Exploitation and Work
Working with exploit (4.31)
Metasploit (7:29)
Meterpreter session (3.23)
Armitage (2.44)
Fixing the armitage (4.38)
Armitage in Action (7.43)
Different Armitage use (9:52).
Armitage Example 2 (7.33)
Network Penetration using Armitage (2.14)
Remote attacks
Port Forwarding (9.24).
Hacking Remotely Demonstration (11.39)
Here’s What You Will Get In Mohamed Atef – Ethical Hacking using Kali Linux from A to Z Course
IMPORTANT: This is it. “Mohamed Atef – Ethical Hacking using Kali Linux from A to Z Course” It is totally Downloadable Available Check your account
(In the event of a broken or lost link, we will renew your connection shortly.
Your patience is greatly appreciated.