BENEFITS
Best Seller
Online Courses
24/7 Support
Lifetime Access
Get Certificate
Curriculum
1 - Introduction
Available in
days
days
after you enroll
2 - Getting Started with Kali Linux
Available in
days
days
after you enroll
3 - Kali Linux Command Line CLI
Available in
days
days
after you enroll
- 9 - Environment Variables (7:38)
- 10 - Bash History Command (1:56)
- 11 - Piping and Redirection (11:43)
- 12 - Text Searching and Manipulation (7:49)
- 13 - Editing Files (2:21)
- 14 - Comparing Files (2:43)
- 15 - Managing Processes (3:30)
- 16 - File and Command Monitoring (3:23)
- 17 - Downloading Files (1:07)
- 18 - Customizing the Bash Environment (2:32)
4 - Netcat nc Essentials
Available in
days
days
after you enroll
5 - Wireshark
Available in
days
days
after you enroll
- 20 - What is Wireshark and why should you learn it (1:58)
- 22 - OSI model (5:07)
- 23 - Install Wireshark (1:43)
- 24 - WireShark Getting Started (1:53)
- 25 - Sets a conversation filter between two specific IP addresses (2:13)
- 26 - Sets a filter to display all http and dns protocols (2:17)
- 27 - Sets filters for any TCP packet with a specific source or destination port (1:55)
- 28 - displays all TCP packets that contain a certain term (1:35)
- 29 - filters all HTTP GET and POST requests (1:25)
- 30 - filter out certain types of protocols (2:11)
- 33 - Capture Insecure Connections Net Cat (1:45)
- 34 - Capture FTP Passwords (2:47)
- 35 - Extract files from FTP using Wireshark (2:48)
- 36 - Capture HTTP Passwords (1:58)
- 37 - Capture files images from HTTP traffic (2:10)
6 - Bash Scripting Shell Scripting
Available in
days
days
after you enroll
7 - Passive Information Gathering Techniques
Available in
days
days
after you enroll
8 - Active Information Gathering Techniques
Available in
days
days
after you enroll
9 - Scanning with Nmap
Available in
days
days
after you enroll
- 53 - Port Scanners Essentials (5:19)
- 54 - What is Nmap (1:01)
- 55 - Preparing the Environment (12:14)
- 63 - Basic Nmap Scan against IP or host Hands On (1:37)
- 64 - Nmap Ping Scan Hands On (1:13)
- 65 - Scan specific ports or scan entire port ranges Hands On (1:48)
- 66 - Scan multiple IP addresses Hands On (0:59)
- 67 - Scan the most popular ports Hands On (0:46)
- 68 - Scan hosts and IP addresses reading from a text file Hands On (1:40)
- 69 - Save your Nmap scan results to a file Hands On (1:06)
- 70 - Disabling DNS name resolution Hands On (0:52)
- 71 - Scan OS and service detection with fast execution Hands On (1:06)
- 72 - Detect servicedaemon versions Hands On (0:41)
- 73 - Scan using TCP or UDP protocols Hands On (0:44)
- 76 - CVE detection using Nmap Hands On (2:41)
- 77 - Launching DOS with Nmap Hands On (2:11)
- 78 - Launching brute force attacks Hands On (1:27)
- 79 - Detecting malware infections on remote hosts Hands On (2:29)
10 - Web Application Attacks
Available in
days
days
after you enroll
11 - The Metasploit Framework Essentials
Available in
days
days
after you enroll
12 - HandsOn Practice Lab 1
Available in
days
days
after you enroll
13 - HandsOn Practice Lab 2
Available in
days
days
after you enroll
14 - HandsOn Practice Lab 3
Available in
days
days
after you enroll
Exclusive Offer