What you'll learn
- Network penetration testing tools provided by Kali Linux.
- How to use services like ArioDump, John the Ripper, and even Cain & Abel to crack wireless network access points in the neighborhood!
- How to perform faultless reconnaissance using NSLookup, WhoIS, NetCraft, theHarvester, and other tools!
- How to create a test lab with Oracle VirtualBox, Kali Linux, and two vulnerable apps: DVWA and InsecureBank.
- Scan and detect Windows environments to determine an attack surface.
- Maintain a stable backdoor and persistent access to an exploited machine.
Who is this course for
- IT security experts
- Pentesters
- Ethical hackers
- System administrators
- Security analysts with a basic understanding of Kali Linux who wish to do professional-level, sophisticated web penetration testing
After completing this course, you will be the master of penetration testing.
With this, you can get free access to
- Course Materials for Life
- Expertise in anything related to Pentesting Using Kali Linux
Your Instructor
Over 100,000 students have received instruction from Skills Shine Academy in topics including Lift Style, Fitness Training, Cyber Security, Ethical Hacking, Facebook Ads, SEO, Email Marketing, eCommerce, Business Investing, Social Media Marketing, Launching Your Own Business, and Marketing/Ad Agency!
The Multination firm Skills Shine Academy provides a wide variety of top-notch online courses that educate through real-world examples from subject matter Shines and tried-and-true research, all supported by top-notch, studio vocally narrated videos! Teaching practical life skills, which are crucial in today's environment, is the focus.
Every course offered by Skills Shine Academy is instructed by subject-matter specialists who genuinely love what they do and want to share it with others.
Course Curriculum
- 01 - Course Overview (1:56)
- 02 - About Sniffing and Spoofing (2:50)
- 03 - Using Mac Changer Tool (4:14)
- 04 - Using Wireshark Tool (7:13)
- 05 - Using Ettercap Tool (7:54)
- 06 - Using netsniff-ng Tool (6:30)
- 07 - Using MITMProxy and Driftnet (8:09)
- 08 - About Social Engineering Attacks (3:22)
- 09 - Using Maltego Tool (10:37)
- 10 - Trojan Creation Using SET (9:13)
- 11 - Phishing Using SET (8:31)
- 12 - Using BeEF (12:26)
- 13 - About Wireless Attack (4:02)
- 14 - Monitor Mode (5:35)
- 15 - Using Fern Tool for WEP Attacks (9:10)
- 16 - Using Crunch Tool (11:07)
- 17 - Using Fern Tool for WPA2 Attacks (8:36)
- 18 - About Forensics (4:02)
- 19 - Using FTK Imager Tool (8:36)
- 20 - Using Guymager Tool (7:00)
- 21 - Using Autopsy Tool (11:44)
- 22 - Using Bulk Extractor Tool (8:36)
- 23 - Using Hashdeep Tool (7:04)
- 24 - Memory Analysis Using Volatility (10:31)
- 25 - Metasploit Introduction (6:10)
- 26 - Windows 10 Exploitation Using Trojan (6:02)
- 27 - Antivirus Bypass Frameworks (5:42)
- 28 - Windows 10 Defender Bypass (7:14)
- 29 - Windows 10 Antivirus Bypass (10:24)
- 30 - About Post Exploitation (3:15)
- 31 - Access Meterpreter Session (8:54)
- 32 - Keylogger Attack (3:39)
- 33 - Windows 10 Privilege Escalation (8:47)
- 34 - Stealing Windows 10 Passwords (5:56)
- 35 - Using Cutycapt Tool (6:29)
- 36 - Using Pipal Tool (5:16)
- 37 - Using Dradis Tool (6:49)
- 38 - Using Magictree Tool (6:56)
- 39 - Using Recordmydesktop Tool (8:36)
Frequently Asked Questions
When does the course start and finish?
The course has begun and will never stop! You set the start and end dates for this entirely self-paced online course.
How long do I have access to the course?
Lifetime access—how does that sound? You receive unrestricted access to this course after registering for as long as you like, on any device you own.
Do I get a certificate?
Yes, when you complete the course, you will receive a certificate of completion which you can happily add to your resume or LinkedIn profile.
Can I cancel my subscription?
Yes, you can. You have a 15-days money-back guarantee.