The Kali Linux – Beginner to Advanced
Free

Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by Offensive Security, a leading information security training company.
Kali Linux was released on the 13th March, 2013 as a complete, top-to-bottom rebuild of BackTrack Linux, adhering completely to Debian development standards.
This course Kali Linux is specifically tailored to the needs of penetration testing for the Cyber Security Professionals.
Course Features
- Lectures 72
- Quizzes 0
- Duration 20 hours
- Skill level All levels
- Language English
- Students 69
- Assessments Yes
-
Chapter 1
- Introduction
- Course Prerequisites
- Basic Terminology
- Basic Terminology (Continued)
- Installing VirtualBox with RPM
- VirtualBox Installation Using the Linux Package Manager
- Virtual Machine Configuration
- Installing VirtualBox on Windows
- Kali Linux Installation
- Starting Kali Linux, Configuring the Network, and Updating Software
-
Chapter 2
- Installing VirtualBox Guest Additions
- Introduction to the Terminal
- Command Line Essentials (Part 1)
- Command Line Essentials (Part 2)
- Accessing the Dark Web Using the Tor Browser (Part 1)
- Accessing the Dark Web Using the Tor Browser (Part 2)
- Staying Anonymous with ProxyChains (Part 1)
- Staying Anonymous with ProxyChains (Part 2)
- Staying Anonymous with ProxyChains (Part 3)
- Virtual Private Network (VPN) Setup (Part 1)
- Virtual Private Network (VPN) Setup (Part 2)
-
Chapter 3
- Macchanger (Part 1)
- Macchanger (Part 2)
- Footprinting with Nmap (Part 1)
- Footprinting with Nmap (Part 2)
- External Nmap Resources
- Introduction to WiFi Cracking
- Aircrack and Reaver Installation
- Aircrack-ng and Crunch Setup
- Aircrack-ng and Crunch Usage Example (Part 1)
- Aircrack-ng and Crunch Usage Example (Part 2)
- Aircrack-ng and Crunch Usage Example (Part 3)
-
Chapter 4
- Brute-Forcing WPS Pins with Reaver (Part 1)
- Brute-Forcing WPS Pins with Reaver (Part 2)
- Brute-Forcing WPS Pins with Reaver (Part 3)
- Signal Jamming and Denial of Service Demonstration (Part 1)
- Signal Jamming and Denial of Service Demonstration (Part 2)
- SSL Stripping and ARP Spoofing (Part 1)
- SSL Stripping and ARP Spoofing (Part 2)
- SSL Stripping and ARP Spoofing (Part 3)
- Funny Things (Part 1)
- Funny Things (Part 2)
- Funny Things (Part 3)
-
Chapter 5
-
Chapter 6
- MySQL Database Setup
- Burp Suite Basics
- Sqlmap Demonstration (Part 1)
- Sqlmap Demonstration (Part 2)
- Introduction to Cracking Hashes
- Cracking Linux Passwords with John the Ripper (Part 1)
- Cracking Linux Passwords with John the Ripper (Part 2)
- Cracking Windows Passwords with John the Ripper
- Introduction to Hydra
- Complete Hydra Demonstration
-
Chapter 7
- Denial of Service (DoS) Demo (Part 1)
- Denial of Service (DoS) Demo (Part 2)
- Denial of Service (DoS) Demo (Part 3)
- Intro to Metasploit and Reverse Shells
- Deploying a Payload with Metasploit
- Escalating Privileges on Another System
- Creating a Persistent Reverse Shell with Metasploit
- Creating Reverse Shells with Netcat
- Uploading a Reverse Shell to a Web Server