- Introduction
- Install & configure Kali Linux Part 1
- Install & configure Kali Linux Part 2
- Planning and Reconnaissance part 1
- Planning and Reconnaissance part 2
- Planning and Reconnaissance part 3
- Vulnerability scanning part1
- Vulnerability scanning part2
- Vulnerability scanning part03
- Vulnerability scanning part4 Nessus
- Vulnerability scanning part4
- Vulnerability scanning part4
- Vulnerability scanning part5
- Exploitation part1
- Exploitation part2
- Exploitation part3
- Exploitation part4 empire
- Exploitation part4
- Post Exploitation
What you'll learn
- Penetration Testing
Description
In this course you will learn how to become a penetration tester, you will learn the penetration testing process and steps.
We will start by an introduction then I will teach you how to install and configure the Kali Linux, kali Linux is most used operation system to do penetration testing, it includes a lot of free tools.
In this course, first we will start to explain some penetration testing terms, then we will explain the reconnaissance phase, this phase is about gathering information about the testing targets. After that we dig into scanning phase and how to find vulnerabilities, we will cover tools used in this phase as vulnerability scanners, these tools will find weakness in the organization systems, then we will use scanners as Nesseus scanner.
The third section will be about the exploitations and tools used to exploit systems, this phase will demo how we can use system weakness or vulnerability to access a machine, and the forth section is about post exploitation.
By watching this course, you gain the knowledge to test you organization network, the results will help to identify weakness and vulnerabilities, then your organization need to adopt tools and procedures to patch these weakness.
I hope you will enjoy this course.
About the instructors
- 3.95 Calificación
- 1293 Estudiantes
- 3 Cursos
RedBro sec
Information Security Consultant
I have a bachelor degree in computer engineering.Sine my graduation I worked in banking sector as Network engineer then I moved to network and security administration, finally I start working as Information security consultant.
I work in projects like SIEM, Vulnerability assessment, and Sandbox.
I possess some certificates like ccna security, ccna R&S, ccna Voice, VCP, Security+, ISO27001, Tenable, and SPLUNK.
I toke a lot of training specially in the network and infrastructure field as CCNP and Storage. In addition I toke CEH and PCI DSS training