Course at a glance
Included in these subscriptions:
- Dev & IT Pro Video
- Dev & IT Pro Power Pack
Release date | 7/21/2017 | |
Level | Beginner | |
Runtime | 1h 30m | |
Closed captioning | N/A | |
Transcript | N/A | |
eBooks / courseware | N/A | |
Hands-on labs | N/A | |
Sample code | Included | |
Exams | Included |
Course description
This course focuses on fully configuring Kali Linux to be the right tool for the job. It starts off with installing, which features to turn off and which tools to install. It covers using TOR, Linux commands, executing scripts and files as well as networking and penetration testing tools.
Prerequisites
In order to maximize you leaning experience when taking this course, the following prerequisites are highly recommended:
Security + Certification, knowledge of CEH (Certified Ethical Hacker), knowledge of
CHFI (Computer Hacking Forensic Investigator) and the CBK (Common Body of Knowledge) associated with the CISSP and CISA certifications are also very helpful.
Meet the expert
Don Bowers has been in the computer industry for over 36 years as a database programmer and an information systems and security analyst. Don’s primary focus over the last 10 years has been in the area of information security and digital forensics. Don currently serves as an Assistant Professor and the Program Chair for the Cybersecurity program at the College of Western Idaho. As well as being an associate professor Don also holds the distinction of being a Certified EC-Council Instructor. Don holds several industry certifications including MCITP Enterprise, MCSE + Security, CISSP, CISA, CEH, CHFI, ECSA (EC-Council Security Analysis), LPT (Licensed Penetration Tester) and ACE (AccessData Certified Examiner).
Course outline
Configure Kali Linux
Configure Kali Linux Part 1 (30:01)
- Introduction (00:10)
- Prepare Kali for Pen Testing Part 1 (03:32)
- Demo: Update and Upgrade (05:08)
- Demo: Turn Off Features (02:40)
- Demo: Guake (06:16)
- Demo: Installing Tools (05:37)
- Demo: More tools (06:27)
- Summary (00:08)
Configure Kali Linux Part 2 (26:16)
- Introduction (00:08)
- Preparing Kali Linux for Pen Testing Part 2 (02:57)
- Demo: Remote Login (02:10)
- Demo: TOR (05:03)
- Demo: Using TOR (02:27)
- Demo: Auto-Login, and Password (04:07)
- Demo: Apache Web Server (03:20)
- Demo: Using Apache Web Server and Gedit (05:53)
- Summary (00:08)
Configure Kali Linux Part 3 (33:43)
- Introduction (00:08)
- Demo: Execute Scripts and Find Files (02:08)
- Demo: Linux Commands (09:16)
- Demo: File Structure (05:14)
- Demo: Searching (03:16)
- Demo: Penetration Testing Tools (05:49)
- Demo: Networking Tools (05:47)
- Demo: Nmap (01:52)
- Summary (00:08)