Course curriculum

  • 1

    Introduction

    • 1 - Introduction

  • 2

    Downloading Required Programs

    • 2 - Download Virtual Box

    • 3 - Download Kali Linux

  • 3

    Installations

    • 4 - Install VBox

    • 5 - Add And Install Kali Linux

  • 4

    Kali Linux Login Page

    • 6 - Change the Desktop View Mode

    • 7 - Login Root User

  • 5

    Kali Linux Desktop

    • 8 - Welcome Kali Linux Desktop

    • 9 - Dock Bar Use

    • 10 - What Is The Notification Menu

    • 11 - What is the Events Menu

    • 12 - What Does the Applications Menu Do

    • 13 - What is the System Menu

  • 6

    Kali Linux Change Settings

    • 14 - Changing Image Resolution Settings

    • 15 - Changing the Desktop

    • 16 - Switching Between Windows

    • 17 - Moving - Resizing - Tiling Windows

    • 18 - Network Settings

    • 19 - Accessing the Control Panel

    • 20 - How to Monitor & Terminate System Processes

  • 7

    Software Install & Remove Section

    • 21 - Software Install

    • 22 - Software Update

  • 8

    User Permission

    • 23 - Add & Remove User

  • 9

    File And Folder Management

    • 24 - File Manager

    • 25 - Open Text Editor

    • 26 - Create Folder - File - View Hidden Files

  • 10

    Video - Music - Image

    • 27 - Listening to Music & Watching Videos

    • 28 - Recording Desktop

    • 29 - Open Pictures

    • 30 - Use Terminal

  • 11

    Hacking With Kali Linux

    • 31 - Wireshark

    • 32 - Passive Scan - ARP Tables

    • 33 - The Harvester & Recon-NG

  • 12

    Using NMAP

    • 34 - What is Nmap

    • 35 - Nmap Ping Scanning

    • 36 - Nmap Service Version Detect

  • 13

    Using Nessus

    • 37 - Nessus Introduction

    • 38 - Downloading Nessus

    • 39 - Installing Nessus

    • 40 - Nessus Creating Policy

    • 41 - Nessus Scanning

  • 14

    Using Maltego

    • 42 - Maltego - Visual Link Analysis Tool

  • 15

    Using Armigate

    • 43 - Armitage

  • 16

    Wi-Fi Hacking Tools

    • 44 - Wireless Recon with Bettercap

    • 45 - Kismet-Wardriving-Install

    • 46 - Wardriving with Kismet Configuration

    • 47 - Wardriving with Kismet Mapping

    • 48 - Airbase-NG

  • 17

    Using Metasploit Framework

    • 49 - Why Metasploit Framework AKA - MSF

    • 50 - Evolution of Metasploit

    • 51 - Metasploit Filesystem and Libraries

    • 52 - MSFConsole Basic Commands 1

    • 53 - MSFConsole Basic Commands 2

    • 54 - MSFConsole Basic Commands 3

    • 55 - Using Databases in MSF 1

    • 56 - Using Databases in MSF 2

    • 57 - Metasploit as Exploitation Tool

    • 58 - MSFvenom

    • 59 - MSFVenom Using Encoders

    • 60 - MSFVenom Using Custom Executable Template

  • 18

    Using Meterpreter

    • 61 - Meterpreter

    • 62 - Basic Meterpreter Commands 1

    • 63 - Basic Meterpreter Commands 2

    • 64 - Basic Meterpreter Commands 3