Introduction to Kali Linux – Kali Linux Training
Kali Linux is a flavor of Linux targeted at digital forensics experts and penetration (pen) testers. It includes over 400 pen-testing programs, and it is the primary tool used by ethical hackers. Using Kali Linux, certified ethical hackers can test networks on their organizations’ behalves, to see if they’re vulnerable to external attacks.
This course will provide prospective ethical hackers with a brief overview of the tools in Kali Linux. Cybersecurity expert Malcolm Shore shows how to set up a virtual environment for testing, configure Kali Linux, and install toolsets for information gathering, vulnerability assessment, password and hash cracking and target exploitation.
Because businesses are connected, they are also exposed. Vulnerability testing helps organizations limit that exposure. This course will help you explore the careers, techniques, and tools behind ethical hacking-one of the most competitive and sought-after IT security skills.
Table of Contents:
1. Setting Up the Virtual Lab
2. Introducing Kali
3. Information Gathering (Understanding the Target)
4. Vulnerability Analysis
5. Passwords and Hashes
6. Exploiting Targets
Teacher: Malcolm Shore
Level of training: Preliminary
time of training: 2 hours + 35 minutes
File size: 465 MB