Course description
In this course Rafiq will dig deeper into the primary operating systems used for hacking: linux and windows. Automating tasks is critical to your job as a hacker and knowledge of shell scripts is key. Some of these examples will be shown as well as an overview of hacking terminology around operating systems and a look at Linux and Windows. This course is part of a series covering EC-Council's Certified Ethical Hacker (CEH).
Prerequisites
To get the most out of this course, this course assumes that you have a good working knowledge of Linux and Windows based networking environments. It also assumes that you have experience with managing a network, have worked with networking hardware such as switches & routers, are familiar with MS Active Directory (AD) Domain based authentication, know how to work with command-line utilities, and understand the basics of Web Server environments.
Many of the demonstrations in this course use the Windows 7 and Kali Linux operating systems which can be downloaded free from the respective sites. All of the demonstrations are created in a virtual environment using Oracle VirtualBox and VMware vSphere 6.
Learning Paths
This course will help you prepare for the following certification and exam:
Certified Ethical Hacker
312-50: Certified Ethical Hacker
Meet the expert
Rafiq Wayani has extensive experience including more than 20 years in IT as Systems Architect, Software Engineer, DBA, and Project Manager. Wayani has instructed in a variety of technical areas, has designed and implemented network and information systems, and is certified across a wide range of platforms and systems including Microsoft Solutions Developer, Systems Engineer, Application Developer, Database Administrator, Trainer; Novell Netware Administrator and Engineer; Master Certified Netware Engineer; and A Certified.
Course outline
Intro to Linux
Intro to Linux (21:12)
- Introduction (00:20)
- Demo: The Linux Environment (05:11)
- Demo: ifconfig (05:37)
- Demo: Linux File Structure (03:47)
- Demo: Permissions (06:02)
- Summary (00:13)
Intro to Linux 2 (21:32)
- Introduction (00:18)
- Demo: File Permissions (05:16)
- Demo: Users (05:15)
- Demo: Permissions Cont. (05:24)
- Demo: User Permissions (05:03)
- Summary (00:14)
Intro to Linux 3 (10:15)
- Introduction (00:23)
- Demo: File Permissions (05:27)
- Demo: Sticky Bit (04:08)
- Summary (00:16)
Intro to Windows (21:31)
- Introduction (00:25)
- Demo: Active Directory (05:05)
- Demo: Group Policy Management (05:54)
- Demo: Applying Policy (05:53)
- Demo: Read and Write Permissions (03:57)
- Summary (00:14)