Practice Your First Penetration Test Kali Metasploit Lab
What you’ll learn
Install and configure Kali Linux
Prepare virtual lab environment with Kali and victim machines
Scan networks with Nmap
Discover vulnerable applications
Exploit Linux and Windows servers with Metasploit
Prepare your laptop with 50GB+ free space on disk
Learn the popular security tools and techniques that you will need to run penetration tests with the best ethical hacking distribution Kali, and the tools: Nmap and Metasploit.
Learn the Essential Techniques and Build a Strong Foundation in Penetration Testing in This Comprehensive Course From Scratch!
Set up ethical hacking environment with KaliPrepare virtual victim environment to run your tests safelyScan the targets with easy-to-use and affective commands in NmapDiscover the vulnerabilities to hack into systemsExploit the targets with MetasploitInteract with payloads on victim machines Download documents, create remote users and take screen captures from exploited Linux and Windows servers.
Powerful Security Skills at Your Fingertips
Learning the fundamentals of ethical hacking puts a powerful and very useful skill at your fingertips. Kali, nmap and metasploit are free and easy to learn tools from beginner to advanced penetration testing operations.
Jobs in penetration testing positions are plentiful and companies are constantly looking for cyber security professionals who have practical-hands on experience on Kali and Metasploit. Experts from the IT industry are also looking for simple yet effective solutions to keep their systems secure.
This course is perfect for anyone seeking to provide safe and secure IT systems with implementing ethical hacking and penetration testing solutions.
Contents and Overview
Suitable for beginners in cyber security, through this course of 45+ lectures and 3 hours of video content, you will learn all the details about setting up and using Kali Linux Distribution and establish a strong understanding of the process behind a professional penetration test.
This course starts with introducing basic – yet very important aspects of ethical hacking. After this quick summary, you will find yourself already practicing how to setup a penetration testing platform with Kali and victim machines, which you can use in your professional life.
Right after deploying the systems, you will immediately start scanning the target environment, which consists of 1 intentionally vulnerable Linux distribution and 1 Windows 7.
After completing scanning operations, you will learn the famous hacking framework Metasploit with all important options, by practicing against victim machines. And finally, you will be able to exploit and remotely access to Linux and Windows machines, where you will practice ethical hacking skills like downloading documents and gaining passwords, with leveraging advanced payloads like meterpreter.
Upon completion, you will learn how to prepare your ethical hacking environment with Kali, scan network segments per your needs, discover vulnerabilities, exploit victims and gain remote access to compromised machines.
What are the requirements?
A willingness to learn and an open mindBasic understanding of how computers workSome linux and network experience is a plus
What am I going to get from this course?
By the end of this course, you will be able to prepare your hacking environment and start using KaliYou will have the ability to scan networks to detect open ports and servicesYou will discover vulnerabilities by comparing your nmap scan results and related metasploit modulesYou will exploit vulnerable application with metasploit modulesYou will access compromised servers and run commands remotely
What is the target audience?
College students and professionals from technical domainsIT enthusiasts or entrepreneursAnyone interested in exploring a new domain from scratch
Section 1: Introduction and Welcome!
Lecture 1 Introduction
Lecture 2 Course Content
Lecture 3 VERYY IMPORTANT NOTE!
Section 2: Introduction to Pentesting and Kali
Lecture 4 So, what is pentesting?
Lecture 5 Types of Pentests and Pentesting Process
Lecture 6 Phases and Scope Summary
Lecture 7 Lets Talk About Kali
Lecture 8 Section 2: Wrap Up!
Section 3: Installing Lab Environment
Lecture 9 Why Do We Need a Lab Environment?
Lecture 10 Download List
Lecture 11 Downloading Kali, Vmware Workstation, Metasploitable, Windows 7
Lecture 12 Installing VMware Player
Lecture 13 Installing Kali
Lecture 14 Installing Metasploitable
Lecture 15 Installing Windows 7
Lecture 16 Section 3: Wrap Up!
Section 4: Working with Kali
Lecture 17 Kali Desktop Interface and Menus
Lecture 18 Updating and Upgrading Kali
Lecture 19 Installing VM Tools
Lecture 20 Essential Tools in Kali
Lecture 21 Section 4: Wrap Up!
Section 5: Configuring Victims
Lecture 22 We Need Victims!
Lecture 23 Preparing Metasploitable
Lecture 24 Good Old Friend Windows
Lecture 25 Making Windows Vulnerable
Lecture 26 Section 5: Wrap Up!
Section 6: Action Time with Nmap
Lecture 27 First Scan with Nmap
Lecture 28 Types of Port Scanning
Lecture 29 Port Scanning Practice
Lecture 30 Service and Version Detection
Lecture 31 Let’s Scan Faster!
Lecture 32 How to Save Nmap Results?
Lecture 33 Section 6: Wrap Up!
Section 7: Exploitation with Metasploit
Lecture 34 Exploitation Basics
Lecture 35 Metasploit is THE Exploitation Framework
Lecture 36 Diving Into Metasploit
Lecture 37 Import Operations with MSF database
Lecture 38 Your First Shell!
Lecture 39 Let’s Practice!
Lecture 40 Creating Users Remotely in Limited Shells
Lecture 41 Section 7: Wrap Up!
Section 8: Windows Hacking and Meterpreter
Lecture 42 Introduction to Windows Hacking
Lecture 43 Advanced Windows Scanning
Lecture 44 Exploiting Windows 7
Lecture 45 The Power of Metasploit: Meterpreter
Lecture 46 Section 8: Wrap Up!
Section 9: Course Wrap Up and Final Notes
Lecture 47 First Step To Be a Professional Pentester, Completed!
Lecture 48 Good Bye and See You Soon!
This Penetration Testing course is for newbies who has none or limited experience on ethical hacking,The course is also very useful for professionals in this domain who is looking for a quick refresher
Udemy | English | 2h 46m | 2.42 GB
Created by: FeltSecure Labs