| Course Overview | |||
| Course Overview | 00:04:00 | ||
| Building Your Virtual Lab Environment | |||
| Lab-Creating a Virtual install of Kali using VirtualBox | 00:13:00 | ||
| Installing the VirtualBox Extension Pack | 00:02:00 | ||
| Lab-Creating a Virtual Install of CSI Linux | 00:13:00 | ||
| Lab-Creating an Unattended Virtual Install of XP Using Virtualbox | 00:08:00 | ||
| Taking a Snapshot of Your Current configuration | 00:04:00 | ||
| Anonymity - Remaining Anonymous While Browsing Online | |||
| Lab-Anonymize Kali Using Whonix | 00:10:00 | ||
| Lab-Ensuring Anonymity Using the CSI Linux Gateway | 00:13:00 | ||
| Assigning a Random MAC Address in Kali | 00:07:00 | ||
| Passive reconnaissance | |||
| Lab-Information Gathering Using Maltego | 00:10:00 | ||
| Lab-Conducting OSINT Using CSI Linux Investigator | 00:08:00 | ||
| Using Metagoofil inside CSI Linux Analyst | 00:05:00 | ||
| Conducting a Passive Reconnaissance Using Shodan | |||
| Lab-Preparing CSI Analyst to Use Shodan | 00:06:00 | ||
| Lab-Using Shodan to Find Vulnerable Devices | 00:16:00 | ||
| Lab-Using Shodan to Search for Vulnerable Databases | 00:08:00 | ||
| NMap | |||
| Lab-Introduction to NMap | 00:17:00 | ||
| Lab-NMap Scripting Engine (NSE) | 00:19:00 | ||
| Lab-Scanning for WannaCry Ransomware | 00:14:00 | ||
| Scanning for Vulnerabilities Using NESSUS | |||
| Lab-Installing NESSUS Using Docker | 00:15:00 | ||
| Lab-Scanning for Vulnerabilities Using Nessus | 00:11:00 | ||
| Using Your Nessus Scan Results | 00:12:00 | ||
| Scanning for Vulnerabilities Using OpenVAS | |||
| Lab-Installing OpenVAS Using Docker | 00:09:00 | ||
| Lab – Scanning for Vulnerabilities Using OpenVAS | 00:10:00 | ||
| Exploiting Windows XP | |||
| Video and Lab- Using Metasploit to Launch a DOS Attack Against Windows XP | 00:09:00 | ||
| Lab-Establishing A VNC Shell Using Meterpreter | 00:18:00 | ||
| Lab-Using Meterpreter to backdoor Windows XP | 00:12:00 | ||
| Lab – Exploiting Vulnerable Applications on Windows XP SP2 | 01:15:00 | ||
| Lab – Hacking Windows XP via MS11-006 Windows Shell Graphics Processing | 01:05:00 | ||
| NetCat | |||
| Creating a Virtual Install of Server 2008 Using virtualBox | 00:07:00 | ||
| Lab-Create Reverse Shell Using MS09_050 | 00:12:00 | ||
| Exploiting Linux | |||
| Lab-Installing Metasploitable2 Using VirtualBox | 00:10:00 | ||
| Lab – Learning to Hack Linux Using Metasploitable2 | 01:10:00 | ||
| Lab – Exploring Endpoint Attacks | 01:35:00 | ||
| Social Engineering | |||
| Lab-Using the Social Engineering Toolkit (SET) | 00:07:00 | ||
| BASH Scripting for Pentesters | |||
| Lab-Introduction to BASH Scripting | 00:08:00 | ||
| Lab-Creating a BASH Script for Linux Fedora Part-1 | 00:11:00 | ||
| Lab-Creating a BASH Script for Linux Fedora Part-2 | 00:30:00 | ||
| Password Cracking | |||
| Lab – Password Cracking Using Medusa | 00:06:00 | ||
| Lab-Passwords Cracking Using Mimikatz | 00:11:00 | ||
| Lab-Password Cracking Using Hydra | 00:05:00 | ||
| Web Based Application Attacks | |||
| Lab-Installing w3af in Kali Linux Using Docker | 00:13:00 | ||
| Lab – Conducting A Website Vulnerability Scan Using w3af | 00:05:00 | ||
| Lab – Performing a Browser Based Attack | 00:12:00 | ||
| Lab-SQL Injection Attack Using SQLmap | 00:12:00 | ||
| Browser Exploitation Framework (BeEF) | |||
| Configure Kali for Exploitation the WAN | 00:16:00 | ||
| Lab-The Browser Exploitation Framework (BeEF) | 00:19:00 | ||
| Capture the Flag Walkthrough - Mr. Robot | |||
| Lab file – Capture the Flag (CTF) – Mr. Robot | 02:25:00 | ||
| Video Walk Through -Key #1 | 00:13:00 | ||
| Video Walk through – Key #2 | 00:19:00 | ||
| Video Walk Through – Key #3 | 00:08:00 | ||
| Capture the Flag Walkthrough – Stapler | |||
| Lab File – Walkthrough – CTF – Stapler | 02:40:00 | ||
| Capture the Flag – Stapler Part 1 | 00:18:00 | ||
| Capture the Flag – Stapler Part 2 | 00:17:00 | ||
| Capture the Flag – Stapler Part 3 | 00:17:00 | ||
| Bonus - Digital Forensics Case Management | |||
| Attaching an External USB Device in Kali | 00:07:00 | ||
| Lab -Digital Forensics Using Autopsy Part I | 00:11:00 | ||
| Lab-Digital Forensics Using Autopsy Part II | 00:07:00 | ||
| Assignment | |||
| Assignment – Ethical Hacking and Penetration Testing Using Kali Linux | 00:00:00 | ||
No Reviews found for this course.