• No products in the basket.

Ethical Hacking and Penetration Testing Using Kali Linux

0( 0 REVIEWS )
2 STUDENTS
course-image

Learning Outcome

Description

The Ethical Hacking and Penetration Testing Using Kali Linux is the best way for you to gain deep insight and knowledge of this topic. You will learn from industry experts and obtain an accredited certificate after completing the course. Enrol now for a limited-time discounted price.

Like all the courses of Thames College, this Ethical Hacking and Penetration Testing Using Kali Linux is designed with the utmost attention and thorough research. All the topics are broken down into easy to understand bite-sized modules that help our learners to understand each lesson very easily.

We don’t just provide courses at Thames College; we provide a rich learning experience. After purchasing a course from Thames College, you get complete 1-year access with tutor support. 

Our expert instructors are always available to answer all your questions and make your learning experience exquisite.

After completing the Ethical Hacking and Penetration Testing Using Kali Linux, you will instantly get an e-certificate that will help you get jobs in the relevant field and will enrich your CV.

If you want to learn about this topic and achieve certifications, you should consider this Ethical Hacking and Penetration Testing Using Kali Linux from Thames College.

There are no hidden fees or exam charges. We are very upfront and clear about all the costs of the course. 

Course design

The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace.

You are taught through a combination of

  • Video lessons
  • Online study materials

Will I receive a certificate of completion?

Upon successful completion, you will qualify for the UK and internationally-recognised certification and you can choose to make your achievement formal by obtaining your PDF Certificate at a cost of £9 and Hard Copy Certificate for £15.

Why study this course

Whether you’re an existing practitioner or aspiring professional, this course will enhance your expertise and boost your CV with key skills and an accredited qualification attesting to your knowledge.

The Ethical Hacking and Penetration Testing Using Kali Linux is open to all, with no formal entry requirements. All you need is a passion for learning, a good understanding of the English language, numeracy and IT, and to be over the age of 16.

Course Curriculum

Course Overview
Course Overview 00:04:00
Building Your Virtual Lab Environment
Lab-Creating a Virtual install of Kali using VirtualBox 00:13:00
Installing the VirtualBox Extension Pack 00:02:00
Lab-Creating a Virtual Install of CSI Linux 00:13:00
Lab-Creating an Unattended Virtual Install of XP Using Virtualbox 00:08:00
Taking a Snapshot of Your Current configuration 00:04:00
Anonymity - Remaining Anonymous While Browsing Online
Lab-Anonymize Kali Using Whonix 00:10:00
Lab-Ensuring Anonymity Using the CSI Linux Gateway 00:13:00
Assigning a Random MAC Address in Kali 00:07:00
Passive reconnaissance
Lab-Information Gathering Using Maltego 00:10:00
Lab-Conducting OSINT Using CSI Linux Investigator 00:08:00
Using Metagoofil inside CSI Linux Analyst 00:05:00
Conducting a Passive Reconnaissance Using Shodan
Lab-Preparing CSI Analyst to Use Shodan 00:06:00
Lab-Using Shodan to Find Vulnerable Devices 00:16:00
Lab-Using Shodan to Search for Vulnerable Databases 00:08:00
NMap
Lab-Introduction to NMap 00:17:00
Lab-NMap Scripting Engine (NSE) 00:19:00
Lab-Scanning for WannaCry Ransomware 00:14:00
Scanning for Vulnerabilities Using NESSUS
Lab-Installing NESSUS Using Docker 00:15:00
Lab-Scanning for Vulnerabilities Using Nessus 00:11:00
Using Your Nessus Scan Results 00:12:00
Scanning for Vulnerabilities Using OpenVAS
Lab-Installing OpenVAS Using Docker 00:09:00
Lab – Scanning for Vulnerabilities Using OpenVAS 00:10:00
Exploiting Windows XP
Video and Lab- Using Metasploit to Launch a DOS Attack Against Windows XP 00:09:00
Lab-Establishing A VNC Shell Using Meterpreter 00:18:00
Lab-Using Meterpreter to backdoor Windows XP 00:12:00
Lab – Exploiting Vulnerable Applications on Windows XP SP2 01:15:00
Lab – Hacking Windows XP via MS11-006 Windows Shell Graphics Processing 01:05:00
NetCat
Creating a Virtual Install of Server 2008 Using virtualBox 00:07:00
Lab-Create Reverse Shell Using MS09_050 00:12:00
Exploiting Linux
Lab-Installing Metasploitable2 Using VirtualBox 00:10:00
Lab – Learning to Hack Linux Using Metasploitable2 01:10:00
Lab – Exploring Endpoint Attacks 01:35:00
Social Engineering
Lab-Using the Social Engineering Toolkit (SET) 00:07:00
BASH Scripting for Pentesters
Lab-Introduction to BASH Scripting 00:08:00
Lab-Creating a BASH Script for Linux Fedora Part-1 00:11:00
Lab-Creating a BASH Script for Linux Fedora Part-2 00:30:00
Password Cracking
Lab – Password Cracking Using Medusa 00:06:00
Lab-Passwords Cracking Using Mimikatz 00:11:00
Lab-Password Cracking Using Hydra 00:05:00
Web Based Application Attacks
Lab-Installing w3af in Kali Linux Using Docker 00:13:00
Lab – Conducting A Website Vulnerability Scan Using w3af 00:05:00
Lab – Performing a Browser Based Attack 00:12:00
Lab-SQL Injection Attack Using SQLmap 00:12:00
Browser Exploitation Framework (BeEF)
Configure Kali for Exploitation the WAN 00:16:00
Lab-The Browser Exploitation Framework (BeEF) 00:19:00
Capture the Flag Walkthrough - Mr. Robot
Lab file – Capture the Flag (CTF) – Mr. Robot 02:25:00
Video Walk Through -Key #1 00:13:00
Video Walk through – Key #2 00:19:00
Video Walk Through – Key #3 00:08:00
Capture the Flag Walkthrough – Stapler
Lab File – Walkthrough – CTF – Stapler 02:40:00
Capture the Flag – Stapler Part 1 00:18:00
Capture the Flag – Stapler Part 2 00:17:00
Capture the Flag – Stapler Part 3 00:17:00
Bonus - Digital Forensics Case Management
Attaching an External USB Device in Kali 00:07:00
Lab -Digital Forensics Using Autopsy Part I 00:11:00
Lab-Digital Forensics Using Autopsy Part II 00:07:00
Assignment
Assignment – Ethical Hacking and Penetration Testing Using Kali Linux 00:00:00

Certificate of Achievement

CPD Accredited Certification

You will be eligible for CPD Accredited Certificates after completing this Course successfully.
Certification is available –
  1. In PDF for £2.99
  2. Hard copy for £8.99
Thames-College-Certificate

Course Reviews

  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

N.A

0
1 ratings

No Reviews found for this course.

Thames-college-logo-white-2021

We are a business that specialises in providing CPD & QLS accredited courses for anyone looking to advance their professional career.

Address : 78 Ilford Lane, Ilford, England, IG1 2LA

Email : info@thamescollege.org

Phone Number : ​020 8124 5465

Useful Links

Payment Methods

lead-payment-logos

Copyright © 2024 Thames College. All Right Reserved.

top