Ethical Hacking – A Hands-On Approach to Ethical Hacking

Ethical Hacking – A Hands-On Approach to Ethical Hacking
Ethical Hacking – A Complete Hands-On Training on Offensive Ethical Hacking and Penetration Testing Using Kali Linux
Details
Lecture: 57
Time Required: 9.5 hour
Downloadable Resources: 0
Access: Life Time
Access on mobile and TV
Certificate of Completion
Requirements
Complete Module 01 – Virtual Network Lab Build
A laptop or desktop capable of running two simultaneous virtual installs in conjunction with their host operating system.
Basic networking skills, IP addressing, familiarization with ports and services, configure a network adapter, use PING, IFCONFIG, IPCONFIG
Reliable LAN or cable connection for Internet access.
A host machine running Windows 7, 8.1 or 10 (preferred). MAC and Apple machines will work but a Windows host is preferred.
A minimum of 4 GB of RAM (8 GB preferred)Basic computer fundamentals.
Basic operating system fundamentals.
What you will learn
Use virtualization as it applies to penetration testing.
Discover, scan and exploit network vulnerabilities.
Demonstrate the ability to perform an entry level penetration test.
Targeted Audience
Anyone a wanting pure 100% hands-on learning experience.
Anyone wanting to learn the basics network penetration.
Anyone wanting to apply basic hacking concepts.