• 47
  • 7
  • done
Sponsored Download

Description

Kali Linux - Complete Training Program from Scratch

image

Год выпуска : 2015

Производитель : Udemy

Сайт производителя : www.udemy.com/kali-linux-complete-training-program-from-scratch/

Автор : iCodeiLearn Academy

Продолжительность : 19 hours

Тип раздаваемого материала : Видеоурок

Язык : Английский

Описание : Использование возможностей Кали-Linux. Начать с нуля и перейти к узнать наиболее современные аспекты Кали-Linux


Kali Linux is specifically tailored to the needs of penetration testing professionals. Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools aimed at various information security tasks, such as Penetration Testing, Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by Offensive Security.

Kali Linux will prepare you to enter the world of professional hacking by ensuring that you are well versed with the skills needed and tools used to compromise the security of enterprise networks and information systems. It is no longer sufficient to merely rely on traditional security measures. In order to ensure the security of critical information assets, it is essential to become familiar with the strategies, tactics, and techniques that are used by actual hackers who seek to compromise your network.

Содержание

01 Introduction

02 Installation and Configuration

03 Footprinting and Reconnaisance

04 Harvester, WHO, DNS, URL

05 Social Engineering and information Gathering

06 Trojans and Computer Malwares

07 Trojans and Backdoors

08 Advanced Concepts on Trojans and Computer Malwares

09 DNS spoofing vs DNS poisoning

10 ICMP Redirection

11 Trojans, Networks and EvilGrade

12 Denial of Service Attack

13 Ethical Hacking and Penetration testing

14 Password Cracking

15 Wireless Hacking

16 Meterpreter

17 Metasploit

18 SQL injection

19 Cryptography

20 Metasploit Database

Файлы примеров : отсутствуют

Формат видео : MP4

Видео : AVC, 1280x720, 16:9, 30.000 fps, ~ 192 Kbps

Аудио : AAC, 44.1 KHz, ~ 53.0 Kbps, 2 channels

Скриншоты

image image image


More at ibit.to
And ibit.uno
And ibit.ws

Comments

2 years ago

thank you! :-)

3 years ago

Thnx , if u got something else about Kali please share it

3 years ago

Существует ли подобный курс на русском языке или, хотя бы, с русскими субтитрами?

3 years ago

плохой английский у преподавателя.

3 years ago

преподаватель индус ) говорит хорошо но акцент...

2 years ago

На Udemy 80% курсов индусы и пакистанцы которых слушать невозможно. Давно пора уже уяснить.

2 years ago

таким кулхацкерам как вы, ни руский диктор, ни чистокровный американец не поможет))) Главное не акцент или язык речи, а содержание. А не знаешь английского, то не х лезть в IT, ведь компьютеры и сети это изобретение американцев которые впереди техпрогресса. Кстати английский это еще и международный язык, который стыдно не знать.

2 years ago

sanprice писал(а): 71342777таким кулхацкерам как вы, ни руский диктор, ни чистокровный американец не поможет))) Главное не акцент или язык речи, а содержание. А не знаешь английского, то не х лезть в IT, ведь компьютеры и сети это изобретение американцев которые впереди техпрогресса. Кстати английский это еще и международный язык, который стыдно не знать. Может мне ещё перед каждым рабочим днём американский флаг целовать ?Кстати, к международным языкам относятся русский, арабский, китайский, английский, французский и испанский. Боюсь даже спрашивать, как у Вас с арабским или китайским ? Тоже ведь международный, и его "стыдно не знать".Что касается акцента преподавателя, то он очень влияет на усваиваемость материала, причём влияет негативно.

2 years ago

alegak писал(а): 69018109плохой английский у преподавателя. I agree, unfortunately the voice is so annoying that i can't stand it. Indians should be banned from making online courses for English speaking regions. If you are trying to make a course on English you first have to speak it motherfucker.just check this out: afspot.net/forum/topic/91121-which-people-have-the-worst-english-accents/This of course have nothing to do with the uploader, torrent is legit and video quality is more than decent, but i'd rather be tortured for 2 hours by Spanish inquisition than listen to this rubbish

2 years ago

sonic master писал(а): 72414468IIf you are trying to make a course on English you first have to speak it motherfucker. What are you talking about, man ? This course is not on English, it is on Kali Linux.

Files

17 Metasploit/005 Generating payloads.mp4 70 MB
17 Metasploit/004 Payloads.mp4 33 MB
17 Metasploit/002 Msfconsole commands.mp4 50 MB
17 Metasploit/001 Msfconsole explained.mp4 51 MB
17 Metasploit/003 Exploits.mp4 61 MB
16 Meterpreter/001 Meterpreter Overview.mp4 64 MB
16 Meterpreter/002 Activating Payloads.mp4 56 MB
19 Cryptography/005 Pros and Cons of Cryptography.mp4 29 MB
19 Cryptography/001 Introduction to Cryptography.mp4 24 MB
19 Cryptography/004 Birthday Theorem Digital Signature.mp4 23 MB
01 Introduction/002 What is Ethical hacking and Penetration testing.mp4 29 MB
19 Cryptography/003 Hash Func and Oracle Method.mp4 18 MB
01 Introduction/001 Introduction.mp4 19 MB
19 Cryptography/002 Basic Concepts on Cryptography.mp4 22 MB
18 SQL injection/003 SQL mapping via Kali Linux.mp4 28 MB
18 SQL injection/004 Gathering Password and cracking the hash.mp4 22 MB
18 SQL injection/001 Intro to SQL injection.mp4 12 MB
18 SQL injection/002 SQL injection to google dorks.mp4 30 MB
10 ICMP Redirection/001 Introduction to ICMP redirection.mp4 17 MB
10 ICMP Redirection/002 ICMP redirection Visual Chart.mp4 26 MB
15 Wireless Hacking/004 Wireless cracking Overview.mp4 30 MB
15 Wireless Hacking/005 Wireless cracking via Kali Linux.mp4 25 MB
10 ICMP Redirection/003 ICMP redirection Process and Functions.mp4 20 MB
15 Wireless Hacking/003 802.1X standard.mp4 18 MB
15 Wireless Hacking/002 WPA Continues.mp4 23 MB
15 Wireless Hacking/001 WEP and WPA.mp4 21 MB
14 Password Cracking/008 Generating wordlist Overview.mp4 31 MB
14 Password Cracking/007 Linux Hash Cracking Strategy.mp4 62 MB
14 Password Cracking/009 Generating wordlist Process and Functions.mp4 45 MB
14 Password Cracking/010 CeWL cracking.mp4 26 MB
14 Password Cracking/001 Introduction to Password Cracking.mp4 34 MB
14 Password Cracking/006 Introduction to Linux Hash Cracking.mp4 42 MB
14 Password Cracking/003 Password cracking Strategy shown in Practicals.mp4 27 MB
14 Password Cracking/005 Nuts and Bolts of Windows Password cracking Strategy.mp4 44 MB
14 Password Cracking/004 Windows Password cracking Overview.mp4 43 MB
14 Password Cracking/002 Password cracking Strategy.mp4 32 MB
20 Metasploit Database/003 Exporting Databases shown in Practicals.mp4 21 MB
20 Metasploit Database/001 Importing Databases.mp4 31 MB
20 Metasploit Database/002 Exporting Databases.mp4 24 MB
07 Trojans and Backdoors/004 Backdoor - Maitaining Access.mp4 34 MB
07 Trojans and Backdoors/003 Backdoor - Gaining Access.mp4 46 MB
07 Trojans and Backdoors/005 Backdoor - Maitaining Access Continued.mp4 27 MB
07 Trojans and Backdoors/006 Introducing Command prompt backdoor.mp4 38 MB
07 Trojans and Backdoors/008 Meterpreter Backdoor.mp4 49 MB
07 Trojans and Backdoors/002 Backdoor Process and Functions.mp4 43 MB
07 Trojans and Backdoors/007 Command prompt backdoor Details.mp4 35 MB
07 Trojans and Backdoors/001 Backdoor Overview.mp4 40 MB
04 Harvester, WHO, DNS, URL/003 WHO IS and dnsenum Overview.mp4 41 MB
04 Harvester, WHO, DNS, URL/002 The Harvester Process and Functions.mp4 28 MB
04 Harvester, WHO, DNS, URL/004 DNSenum.mp4 27 MB
04 Harvester, WHO, DNS, URL/007 DNSrecon.mp4 44 MB
04 Harvester, WHO, DNS, URL/005 URLcrazy.mp4 35 MB
04 Harvester, WHO, DNS, URL/006 DNSdict.mp4 41 MB
04 Harvester, WHO, DNS, URL/008 DNSmapping.mp4 37 MB
12 Denial of Service Attack/001 Introduction to DoS.mp4 37 MB
12 Denial of Service Attack/005 Introduction to DDoSing Windows 7.mp4 39 MB
12 Denial of Service Attack/004 Preventing DDoS Attacks.mp4 21 MB
12 Denial of Service Attack/003 Levels of Ddos Attacks.mp4 13 MB
12 Denial of Service Attack/002 DoS vs DDoS.mp4 10 MB
12 Denial of Service Attack/006 DDoSing Windows 7 methods.mp4 37 MB
04 Harvester, WHO, DNS, URL/001 The Harvester Overview.mp4 21 MB
09 DNS spoofing vs DNS poisoning/003 Advanced Concepts on DNS spoofing.mp4 42 MB
09 DNS spoofing vs DNS poisoning/002 DNS spoofing.mp4 27 MB
09 DNS spoofing vs DNS poisoning/005 Port Stealing.mp4 31 MB
09 DNS spoofing vs DNS poisoning/004 DHCP Spoofing.mp4 21 MB
09 DNS spoofing vs DNS poisoning/001 DNS spoofing vs DNS poisoning.mp4 15 MB
06 Trojans and Computer Malwares/003 Dangerous viruses of all time.mp4 14 MB
06 Trojans and Computer Malwares/002 Types of Computer Malwares.mp4 21 MB
06 Trojans and Computer Malwares/001 Introduction to Computer Malwares.mp4 19 MB
06 Trojans and Computer Malwares/005 Installing Rootkit Hunter.mp4 32 MB
06 Trojans and Computer Malwares/004 Some Prominent Dangerous viruses of all time.mp4 18 MB
03 Footprinting and Reconnaisance/015 Nmap.mp4 49 MB
03 Footprinting and Reconnaisance/016 ZenMap.mp4 46 MB
03 Footprinting and Reconnaisance/008 DNS footprinting Overview.mp4 28 MB
03 Footprinting and Reconnaisance/007 Who is lookup.mp4 38 MB
03 Footprinting and Reconnaisance/014 Introduction to Nmap and ZenMap.mp4 53 MB
03 Footprinting and Reconnaisance/013 Connecting information database.mp4 36 MB
03 Footprinting and Reconnaisance/009 DNS footprinting Functions and Process.mp4 22 MB
03 Footprinting and Reconnaisance/010 Determining Operation System.mp4 37 MB
03 Footprinting and Reconnaisance/011 Introduction to Phishing Attacks.mp4 32 MB
03 Footprinting and Reconnaisance/012 Phishing Attacks Details.mp4 26 MB
03 Footprinting and Reconnaisance/006 Google Hacking Processes.mp4 25 MB
03 Footprinting and Reconnaisance/005 Nuts and Bolts of Google Hacking.mp4 34 MB
03 Footprinting and Reconnaisance/004 Introduction to Google Hacking.mp4 28 MB
03 Footprinting and Reconnaisance/003 Footprinting Tools.mp4 66 MB
03 Footprinting and Reconnaisance/002 Footprinting Objectives.mp4 19 MB
03 Footprinting and Reconnaisance/001 What is Footprinting.mp4 25 MB
02 Installation and Configuration/002 Operating systems Overview.mp4 16 MB
02 Installation and Configuration/001 Kali Linux.mp4 49 MB
02 Installation and Configuration/006 Configuring Kali Linux.mp4 47 MB
02 Installation and Configuration/005 Installing vmware tools.mp4 35 MB
02 Installation and Configuration/004 Installing Operating Systems.mp4 20 MB
02 Installation and Configuration/003 Concepts on Operating systems.mp4 26 MB
02 Installation and Configuration/007 Installing Kali Linux on MacBook.mp4 53 MB
11 Trojans, Networks and EvilGrade/003 Driftnet.mp4 44 MB
11 Trojans, Networks and EvilGrade/004 Introducing EvilGrade.mp4 32 MB
11 Trojans, Networks and EvilGrade/001 Killing a Network.mp4 51 MB
11 Trojans, Networks and EvilGrade/005 EvilGrade Continues.mp4 27 MB
11 Trojans, Networks and EvilGrade/002 Ddosing unauthorised Network.mp4 33 MB
13 Ethical Hacking and Penetration testing/001 Introduction to Hacking.mp4 23 MB
13 Ethical Hacking and Penetration testing/002 Hacking through Android.mp4 30 MB
13 Ethical Hacking and Penetration testing/003 Hacking Android via Kali Linux.mp4 45 MB
05 Social Engineering and information Gathering/005 Phishing Attack.mp4 31 MB
05 Social Engineering and information Gathering/006 Phishing Attack Consequences.mp4 29 MB
05 Social Engineering and information Gathering/004 Spear-phishing Attack.mp4 44 MB
05 Social Engineering and information Gathering/001 Introduction to Social Engineering and information Gathering.mp4 20 MB
05 Social Engineering and information Gathering/007 Mass mailer Attack.mp4 34 MB
05 Social Engineering and information Gathering/002 Types of Social Engineering.mp4 12 MB
05 Social Engineering and information Gathering/003 Social Engineering attacks.mp4 20 MB
08 Advanced Concepts on Trojans and Computer Malwares/007 Introduction to Java Applet Attack Method.mp4 23 MB
08 Advanced Concepts on Trojans and Computer Malwares/003 Hacking win7 SAM database.mp4 68 MB
08 Advanced Concepts on Trojans and Computer Malwares/002 Forensic escaping.mp4 32 MB
08 Advanced Concepts on Trojans and Computer Malwares/001 I am Root.mp4 70 MB
08 Advanced Concepts on Trojans and Computer Malwares/004 Jack the ripper.mp4 60 MB
08 Advanced Concepts on Trojans and Computer Malwares/005 Meterpreter commands.mp4 52 MB
08 Advanced Concepts on Trojans and Computer Malwares/009 MITM Attack.mp4 16 MB
08 Advanced Concepts on Trojans and Computer Malwares/008 Java Applet Attack Method Continues.mp4 57 MB
08 Advanced Concepts on Trojans and Computer Malwares/006 PDF embedded Trojan Horse.mp4 50 MB
08 Advanced Concepts on Trojans and Computer Malwares/010 ARP Poisoning.mp4 18 MB

Stream

Downloading Seeding Udemy - Kali Linux - Complete Training Program from Scratch from to 0 peers.
of
0 b/s / ↗0 b/s