Do you want to become a pro with the tools that Kali Linux offers? Perform advanced penetration testing? Learn and practice ways to exploit the vulnerable systems and patch them! Get ready to make the best use of one of the most popular pen testing tools fancied by hackers around the globe.
This course will start from scratch and will provide you with essential knowledge of the most happening and widely used tools available in Kali Linux by performing real-world practicals. You will learn sniffing and spoofing attacks. You will also learn wireless hacking along with exploitation and post-exploitation techniques. This will train you to exploit various systems to carry out several powerful attacks and enable you to write reports post penetration testing.
After completion of this course, you will be a pro in using major tools in Kali Linux and perform penetration testing.
Table of contents
- Chapter 1: Sniffing and Spoofing
- Chapter 2: Social Engineering Attacks
- Chapter 3: Wireless Attacks
- Chapter 4: Forensics Tools
- Chapter 5: Exploitation
- Chapter 6: Post Exploitation
- Chapter 7: Reporting Tools
- Title: Mastering Pentesting Using Kali Linux
- Release date: August 2020
- Publisher(s): EC-Council
- ISBN: None
You might also like
51+ hours of video instruction. Overview The professional programmer’s Deitel® video guide to Python development with …
Clean Code: A Handbook of Agile Software Craftsmanship
Even bad code can function. But if code isn't clean, it can bring a development organization …
Linux Basics for Hackers
If you’re getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for …
Building Microservices, 2nd Edition
Distributed systems have become more fine-grained as organizations shift from code-heavy monolithic applications to smaller, self-contained …