Practice Your First Penetration Test Kali Metasploit Lab

Learn ethical hacking with Kali in your own lab, scan targets with Nmap and exploit victims with metasploit!
Practice Your First Penetration Test Kali Metasploit Lab
File Size :
2.42 GB
Total length :
2h 46m

Category

Instructor

FeltSecure Labs

Language

Last update

5/2017

Ratings

4.6/5

Practice Your First Penetration Test Kali Metasploit Lab

What you’ll learn

Install and configure Kali Linux
Prepare virtual lab environment with Kali and victim machines
Scan networks with Nmap
Discover vulnerable applications
Exploit Linux and Windows servers with Metasploit

Practice Your First Penetration Test Kali Metasploit Lab

Requirements

Prepare your laptop with 50GB+ free space on disk

Description

Learn the popular security tools and techniques that you will need to run penetration tests with the best ethical hacking distribution Kali, and the tools: Nmap and Metasploit.
Learn the Essential Techniques and Build a Strong Foundation in Penetration Testing in This Comprehensive Course From Scratch!
Set up ethical hacking environment with KaliPrepare virtual victim environment to run your tests safelyScan the targets with easy-to-use and affective commands in NmapDiscover the vulnerabilities to hack into systemsExploit the targets with MetasploitInteract with payloads on victim machines Download documents, create remote users and take screen captures from exploited Linux and Windows servers.
Powerful Security Skills at Your Fingertips
Learning the fundamentals of ethical hacking puts a powerful and very useful skill at your fingertips. Kali, nmap and metasploit are free and easy to learn tools from beginner to advanced penetration testing operations.
Jobs in penetration testing positions are plentiful and companies are constantly looking for cyber security professionals who have practical-hands on experience on Kali and Metasploit. Experts from the IT industry are also looking for simple yet effective solutions to keep their systems secure.
This course is perfect for anyone seeking to provide safe and secure IT systems with implementing ethical hacking and penetration testing solutions.
Contents and Overview
Suitable for beginners in cyber security, through this course of 45+ lectures and 3 hours of video content, you will learn all the details about setting up and using Kali Linux Distribution and establish a strong understanding of the process behind a professional penetration test.
This course starts with introducing basic – yet very important aspects of ethical hacking. After this quick summary, you will find yourself already practicing how to setup a penetration testing platform with Kali and victim machines, which you can use in your professional life.
Right after deploying the systems, you will immediately start scanning the target environment, which consists of 1 intentionally vulnerable Linux distribution and 1 Windows 7.
After completing scanning operations, you will learn the famous hacking framework Metasploit with all important options, by practicing against victim machines. And finally, you will be able to exploit and remotely access to Linux and Windows machines, where you will practice ethical hacking skills like downloading documents and gaining passwords, with leveraging advanced payloads like meterpreter.
Upon completion, you will learn how to prepare your ethical hacking environment with Kali, scan network segments per your needs, discover vulnerabilities, exploit victims and gain remote access to compromised machines.
What are the requirements?
A willingness to learn and an open mindBasic understanding of how computers workSome linux and network experience is a plus

What am I going to get from this course?
By the end of this course, you will be able to prepare your hacking environment and start using KaliYou will have the ability to scan networks to detect open ports and servicesYou will discover vulnerabilities by comparing your nmap scan results and related metasploit modulesYou will exploit vulnerable application with metasploit modulesYou will access compromised servers and run commands remotely

What is the target audience?
College students and professionals from technical domainsIT enthusiasts or entrepreneursAnyone interested in exploring a new domain from scratch

Overview

Section 1: Introduction and Welcome!

Lecture 1 Introduction

Lecture 2 Course Content

Lecture 3 VERYY IMPORTANT NOTE!

Section 2: Introduction to Pentesting and Kali

Lecture 4 So, what is pentesting?

Lecture 5 Types of Pentests and Pentesting Process

Lecture 6 Phases and Scope Summary

Lecture 7 Lets Talk About Kali

Lecture 8 Section 2: Wrap Up!

Section 3: Installing Lab Environment

Lecture 9 Why Do We Need a Lab Environment?

Lecture 10 Download List

Lecture 11 Downloading Kali, Vmware Workstation, Metasploitable, Windows 7

Lecture 12 Installing VMware Player

Lecture 13 Installing Kali

Lecture 14 Installing Metasploitable

Lecture 15 Installing Windows 7

Lecture 16 Section 3: Wrap Up!

Section 4: Working with Kali

Lecture 17 Kali Desktop Interface and Menus

Lecture 18 Updating and Upgrading Kali

Lecture 19 Installing VM Tools

Lecture 20 Essential Tools in Kali

Lecture 21 Section 4: Wrap Up!

Section 5: Configuring Victims

Lecture 22 We Need Victims!

Lecture 23 Preparing Metasploitable

Lecture 24 Good Old Friend Windows

Lecture 25 Making Windows Vulnerable

Lecture 26 Section 5: Wrap Up!

Section 6: Action Time with Nmap

Lecture 27 First Scan with Nmap

Lecture 28 Types of Port Scanning

Lecture 29 Port Scanning Practice

Lecture 30 Service and Version Detection

Lecture 31 Let’s Scan Faster!

Lecture 32 How to Save Nmap Results?

Lecture 33 Section 6: Wrap Up!

Section 7: Exploitation with Metasploit

Lecture 34 Exploitation Basics

Lecture 35 Metasploit is THE Exploitation Framework

Lecture 36 Diving Into Metasploit

Lecture 37 Import Operations with MSF database

Lecture 38 Your First Shell!

Lecture 39 Let’s Practice!

Lecture 40 Creating Users Remotely in Limited Shells

Lecture 41 Section 7: Wrap Up!

Section 8: Windows Hacking and Meterpreter

Lecture 42 Introduction to Windows Hacking

Lecture 43 Advanced Windows Scanning

Lecture 44 Exploiting Windows 7

Lecture 45 The Power of Metasploit: Meterpreter

Lecture 46 Section 8: Wrap Up!

Section 9: Course Wrap Up and Final Notes

Lecture 47 First Step To Be a Professional Pentester, Completed!

Lecture 48 Good Bye and See You Soon!

This Penetration Testing course is for newbies who has none or limited experience on ethical hacking,The course is also very useful for professionals in this domain who is looking for a quick refresher

Course Information:

Udemy | English | 2h 46m | 2.42 GB
Created by: FeltSecure Labs

You Can See More Courses in the IT & Software >> Greetings from CourseDown.com

New Courses

Scroll to Top