The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription

The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription


You will learn how to install Nessus Vulnerability Scanner on Kali Linux and how to do penetration tests with Kali Linux.

Certificate of completion, 1 CPE credit


Course format


    • The course is self-paced – you can visit the training whenever you want and your content will be there.
    • Once you’re in, you keep access forever, even when you finish the course. 
    • There are no deadlines, except for the ones you set for yourself. 

SYLLABUS


MODULE 1: SETTING UP YOUR VIRTUAL ENVIRONMENT

    • Building the Virtual Hacking Environment
    • Victim Machine (Microsoft Windows) (Metasploitable) (kioptrix)

    • Kioptrix Hacking Challenges

    • OS for Web for Pen testers

    • DVWA


MODULE 2: KALI LINUX AND ETHICAL HACKING

    • Knowledge Base

    • Phases of Ethical Hacking

    • Lab Tasks

    • Exploiting Windows Machine to gain Shell Access


MODULE 3: KALI LINUX AND EXPLOIT DEVELOPMENT 

    • Kali Linux Exploit Development Support

    • Kali and Metasploit

    • Fuzzing and Kali Linux

    • Kali Linux & EIP Offset

    • Kali and Shellcode


MODULE 4: TOP 10 SECURITY TOOLS IN KALI LINUX

    • Overview: Airckack, Burp Suite, Hydra, John the Ripper, Maltego, Metasploit Network, NMAP, OWASP ZAP, SQLmap, Wireshark

MODULE 5: KNOWN HACKING DISTRIBUTIONS (OPERATING SYSTEMS) OVERVIEW:

    • Blackbuntu
    • NodeZero Linux
    • BackBox
    • Samurai WebTesting Framework
    • STD Linux

MODULE 6

    • Workshop eBook

FINAL QUIZ

 

Course Reviews

3.5

3.5
4 ratings
  • 5 stars0
  • 4 stars2
  • 3 stars2
  • 2 stars0
  • 1 stars0
  1. Easy Hacking With Security Tools

    Good read for beginners

  2. Easy Hacking With Security Tools (W10)

    3

    Great workshop for beginners.

  3. Easy Hacking With Security Tools (W10)

    Suitable course for begginers. most of content can be practiced and mastered straight forwad in few time. for me it was one day working.
    Thank you

  4. Easy Hacking With Security Tools (W10)

    4

    Good course for a beginner

  5. Great workshop

    4

    Great workshop for beginners.
    According to my personal opinion should be placed other examples to explain certain concepts.

  6. Good fundamentals, needs more examples and details

    3

    I took a look at this and thought it was good fundamental starter to using tools. Concepts should be reviewed or referenced a little more and particularly with the exploit dev side, placement ideas of shell code and better diagrams of EBP vs. ESP should be utilize. Readers who aren’t as familiar with x86 intel architecture may not realize the ESP is usually set from EBP first and preserved as a marker for the next PEB frame. Supplemental material, such as the this site may explain and help more to some readers: https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/

TAKE THIS COURSE
  • Premium Subscription Only
  • UNLIMITED ACCESS
  • Course Certificate
401 STUDENTS ENROLLED

Who’s Online

Profile picture of Ashwin

Certificate Code

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013