• Home
  • About Us
    • Who We Are
      • Director’s Profile
    • Lead Contributors
  • Courses

    About Courses

    • All Courses
    • Free Courses
    • Free Webinars
    • Premium Courses
    • Python Learning Path
    • Become a Lead Contributor
    Getting Started with Python

    Getting Started with Python

    ₹999.00
    Read More
  • Students Panel
    • Events
    • Forum
    • FAQs
  • Book Store
  • Blog
  • Contact
    Have any question?
    [email protected]
    Login
    IT Expert TrainingIT Expert Training
    • Home
    • About Us
      • Who We Are
        • Director’s Profile
      • Lead Contributors
    • Courses

      About Courses

      • All Courses
      • Free Courses
      • Free Webinars
      • Premium Courses
      • Python Learning Path
      • Become a Lead Contributor
      Getting Started with Python

      Getting Started with Python

      ₹999.00
      Read More
    • Students Panel
      • Events
      • Forum
      • FAQs
    • Book Store
    • Blog
    • Contact

      Security

      • Home
      • All courses
      • Security
      • The Kali Linux – Beginner to Advanced

      The Kali Linux – Beginner to Advanced

      User Avatar
      ITET Admin
      Security, Trending
      (0 review)
      Free
      Portal Designs (13)
      • Overview
      • Curriculum
      • Instructor
      • Reviews

      Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by Offensive Security, a leading information security training company.

      Kali Linux was released on the 13th March, 2013 as a complete, top-to-bottom rebuild of BackTrack Linux, adhering completely to Debian development standards.

      This course Kali Linux is specifically tailored to the needs of penetration testing for the Cyber Security Professionals.

      Course Features

      • Lectures 72
      • Quizzes 0
      • Duration 20 hours
      • Skill level All levels
      • Language English
      • Students 69
      • Assessments Yes
      ITET CoursesTrendingThe Kali Linux – Beginner to Advanced
      • Chapter 1 10

        • Lecture1.1
          Introduction 09 min
        • Lecture1.2
          Course Prerequisites 08 min
        • Lecture1.3
          Basic Terminology 13 min
        • Lecture1.4
          Basic Terminology (Continued) 19 min
        • Lecture1.5
          Installing VirtualBox with RPM 09 min
        • Lecture1.6
          VirtualBox Installation Using the Linux Package Manager 16 min
        • Lecture1.7
          Virtual Machine Configuration 14 min
        • Lecture1.8
          Installing VirtualBox on Windows 06 min
        • Lecture1.9
          Kali Linux Installation 17 min
        • Lecture1.10
          Starting Kali Linux, Configuring the Network, and Updating Software 13 min
      • Chapter 2 11

        • Lecture2.1
          Installing VirtualBox Guest Additions 15 min
        • Lecture2.2
          Introduction to the Terminal 10 min
        • Lecture2.3
          Command Line Essentials (Part 1) 15 min
        • Lecture2.4
          Command Line Essentials (Part 2) 16 min
        • Lecture2.5
          Accessing the Dark Web Using the Tor Browser (Part 1) 11 min
        • Lecture2.6
          Accessing the Dark Web Using the Tor Browser (Part 2) 16 min
        • Lecture2.7
          Staying Anonymous with ProxyChains (Part 1) 13 min
        • Lecture2.8
          Staying Anonymous with ProxyChains (Part 2) 15 min
        • Lecture2.9
          Staying Anonymous with ProxyChains (Part 3) 14 min
        • Lecture2.10
          Virtual Private Network (VPN) Setup (Part 1) 07 min
        • Lecture2.11
          Virtual Private Network (VPN) Setup (Part 2) 13 min
      • Chapter 3 11

        • Lecture3.1
          Macchanger (Part 1) 13 min
        • Lecture3.2
          Macchanger (Part 2) 11 min
        • Lecture3.3
          Footprinting with Nmap (Part 1) 18 min
        • Lecture3.4
          Footprinting with Nmap (Part 2) 20 min
        • Lecture3.5
          External Nmap Resources 11 min
        • Lecture3.6
          Introduction to WiFi Cracking 16 min
        • Lecture3.7
          Aircrack and Reaver Installation 13 min
        • Lecture3.8
          Aircrack-ng and Crunch Setup 12 min
        • Lecture3.9
          Aircrack-ng and Crunch Usage Example (Part 1) 12 min
        • Lecture3.10
          Aircrack-ng and Crunch Usage Example (Part 2) 11 min
        • Lecture3.11
          Aircrack-ng and Crunch Usage Example (Part 3) 21 min
      • Chapter 4 11

        • Lecture4.1
          Brute-Forcing WPS Pins with Reaver (Part 1) 16 min
        • Lecture4.2
          Brute-Forcing WPS Pins with Reaver (Part 2) 11 min
        • Lecture4.3
          Brute-Forcing WPS Pins with Reaver (Part 3) 17 min
        • Lecture4.4
          Signal Jamming and Denial of Service Demonstration (Part 1) 14 min
        • Lecture4.5
          Signal Jamming and Denial of Service Demonstration (Part 2) 18 min
        • Lecture4.6
          SSL Stripping and ARP Spoofing (Part 1) 09 min
        • Lecture4.7
          SSL Stripping and ARP Spoofing (Part 2) 11 min
        • Lecture4.8
          SSL Stripping and ARP Spoofing (Part 3) 19 min
        • Lecture4.9
          Funny Things (Part 1) 08 min
        • Lecture4.10
          Funny Things (Part 2) 13 min
        • Lecture4.11
          Funny Things (Part 3) 19 min
      • Chapter 5 10

        • Lecture5.1
          Evil Twin (Part 1) 11 min
        • Lecture5.2
          Evil Twin (Part 2) 08 min
        • Lecture5.3
          Evil Twin (Part 3) 12 min
        • Lecture5.4
          Router Vulnerabilities (Part 1) 10 min
        • Lecture5.5
          Router Vulnerabilities (Part 2) 10 min
        • Lecture5.6
          Router Vulnerabilities (Part 3) 19 min
        • Lecture5.7
          Introduction to Social Engineering 10 min
        • Lecture5.8
          Website Cloning Using SEToolkit 13 min
        • Lecture5.9
          Social Engineering Demonstration 14 min
        • Lecture5.10
          Introduction to SQL Injections 13 min
      • Chapter 6 10

        • Lecture6.1
          MySQL Database Setup 15 min
        • Lecture6.2
          Burp Suite Basics 14 min
        • Lecture6.3
          Sqlmap Demonstration (Part 1) 12 min
        • Lecture6.4
          Sqlmap Demonstration (Part 2) 17 min
        • Lecture6.5
          Introduction to Cracking Hashes 13 min
        • Lecture6.6
          Cracking Linux Passwords with John the Ripper (Part 1) 13 min
        • Lecture6.7
          Cracking Linux Passwords with John the Ripper (Part 2) 09 min
        • Lecture6.8
          Cracking Windows Passwords with John the Ripper 20 min
        • Lecture6.9
          Introduction to Hydra 18 min
        • Lecture6.10
          Complete Hydra Demonstration 19 min
      • Chapter 7 9

        • Lecture7.1
          Denial of Service (DoS) Demo (Part 1) 19 min
        • Lecture7.2
          Denial of Service (DoS) Demo (Part 2) 09 min
        • Lecture7.3
          Denial of Service (DoS) Demo (Part 3) 10 min
        • Lecture7.4
          Intro to Metasploit and Reverse Shells 19 min
        • Lecture7.5
          Deploying a Payload with Metasploit 19 min
        • Lecture7.6
          Escalating Privileges on Another System 17 min
        • Lecture7.7
          Creating a Persistent Reverse Shell with Metasploit 11 min
        • Lecture7.8
          Creating Reverse Shells with Netcat 21 min
        • Lecture7.9
          Uploading a Reverse Shell to a Web Server 17 min
      author avatar
      ITET Admin

      Reviews

      Average Rating

      0
      0 rating

      Detailed Rating

      5
      0%
      4
      0%
      3
      0%
      2
      0%
      1
      0%
      • Overview
      • Curriculum
      • Instructor
      • Reviews
      Free
      • Share:

      You May Like

      Getting Started with Python Read More
      ilyas

      Getting Started with Python

      179
      1
      ₹999.00
      Automation with Python Read More
      ilyas

      Automation with Python

      30
      0
      ₹1,999.00
      Web Development with Python Read More
      ilyas

      Web Development with Python

      19
      0
      ₹1,999.00
      Computer Vision With Python Read More
      ilyas

      Computer Vision With Python

      13
      0
      ₹1,999.00
      Associate Big Data Engineer Read More
      ITET Admin

      Associate Big Data Engineer

      5
      0
      ₹70,566.97

      Leave A Reply Cancel reply

      Your email address will not be published. Required fields are marked *

      Categories

      • Artificial Intelligence
      • Cloud
      • Database
      • Network
      • OS
      • Others
      • Programming
      • Security
      • Storage
      • Trending
      • Virtualization
      • Webinars

      Popular Courses

      Getting Started with Python

      Getting Started with Python

      ₹999.00
      Computer Vision With Python

      Computer Vision With Python

      ₹1,999.00
      Web Development with Python

      Web Development with Python

      ₹1,999.00
      web_logo

      5/3, 6th Avenue, Ashok Nagar, Chennai-83

      [email protected]

      More Links

      • Free Courses
      • Events
      • Forums
      • FAQs

      IT Expert Training

      • Free Webinars
      • Who We Are
      • Contact
      • Book Store

      Copyright © 2019 IT Expert Training | Powered by TripleM Infotech

      Login with your site account

      Lost your password?

      Modal title

      Message modal