Ethical Hacking - A Hands-On Approach to Ethical Hacking

Ethical Hacking – A Complete Hands-On Training on Offensive Ethical Hacking and Penetration Testing Using Kali Linux

Details

Lecture: 57
Time Required: 9.5 hour
Downloadable Resources: 0
Access: Life Time
Access on mobile and TV
Certificate of Completion

Requirements

Complete Module 01 – Virtual Network Lab Build
A laptop or desktop capable of running two simultaneous virtual installs in conjunction with their host operating system.
Basic networking skills, IP addressing, familiarization with ports and services, configure a network adapter, use PING, IFCONFIG, IPCONFIG
Reliable LAN or cable connection for Internet access.
A host machine running Windows 7, 8.1 or 10 (preferred). MAC and Apple machines will work but a Windows host is preferred.
A minimum of 4 GB of RAM (8 GB preferred)Basic computer fundamentals.
Basic operating system fundamentals.

What you will learn

Use virtualization as it applies to penetration testing.
Discover, scan and exploit network vulnerabilities.
Demonstrate the ability to perform an entry level penetration test.

Targeted Audience
Anyone a wanting pure 100% hands-on learning experience.
Anyone wanting to learn the basics network penetration.
Anyone wanting to apply basic hacking concepts.
Take This Course