Course OverviewThis course provides learners with a basic level of competency using a hands-on approach to gaining practical experience as a penetration tester or an ethical hacker (white, grey or black).This course provides a fundamental look at offensive security concepts and techniques using a virtual install of Kali Linux and three different target victims, Windows XP, Server 2008 and Linux (Metesploitable2). This course provides a 100% hands-on on approach to learning to be an ethical hacker or a pentester.How is the course structured?The course uses short video tutorials, hands-on labs, virtualization, and open source tools for step-by-step learning of ethical hacking fundamentals; the same tools and open source software are used by professional penetration testers and ethical hackers.This course provides videos, labs, and links for downloading the free and open source software used throughout this course.You will able to build a virtual install of Kali Linux and Windows XP for the virtual lab environment. You should complete the first lab of this course before enrolling. Starting with lab 2, we will begin scanning and attacking a Windows XP victim. If the first lab cannot be completed, there is no need to enroll in the course since all labs that follow are dependent on the first lab being completed.You will learn how intruders escalate privileges and what steps can be taken to stop them, the importance of a strong firewall, the importance of keeping systems and software updated and the use of complex passwords.You will also learn how to launch DDoS Attacks, Buffer Overflows, keylogging, and password hacking. Completion of the course will help prepare an individual for an entry-level position as a pen-tester or ethical hacker. On completing this course, you will receive a course completion.
t connection. (5mb or higher throughput)SoftwareAny 64-bit Windows operating system. (preferred)
A current 64-bit version of...
Facilities
Location
Start date
Online
Start date
Different dates availableEnrolment now open
About this course
Use virtualization as it applies to penetration testing
Discover, scan and exploit network vulnerabilities
Demonstrate the ability to perform an entry level penetration test
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you
We are verifying your question adjusts to our publishing rules. According to your answers, we noticed you might not be elegible to enroll into this course, possibly because of: qualification requirements, location or others. It is important you consult this with the Centre.
Thank you!
We are reviewing your question. We will publish it shortly.
Or do you prefer the center to contact you?
Reviews
Have you taken this course? Share your opinion
This centre's achievements
2021
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 4 years
Subjects
Network Training
Install
Systems
Operating Systems
Hacking
Hacker
Network
Approach
Internet
Linux
Networks
Windows
Course programme
Virtual Network Lab Build
1 lecture09:25Start Here! Course Overview.
Virtual Network Lab Build
1 lecture09:25Start Here! Course Overview.
Start Here! Course Overview.
Start Here! Course Overview.
Start Here! Course Overview.
Start Here! Course Overview.
Course Overview.
Course Overview.
For VirtualBox Users
3 lectures35:35Video and lab - Creating a Virtual install of Kali using VirtualBox In this first lab, students will create a virtual install of Kali Linux using VMWare Player or VirtualBox depending on their host platform and personal preferences.Video and lab - Creating an Unattended Virtual Install of XP Using Virtualbox Windows XP is our victim or target for the labs. Though some of these labs will work using newer operating systems as targets, Windows XP is still relevant in roughly 75% of all networks making it a viable target.Video - Troubleshooting Connectivity Issues With Virtualization A short video on troubleshooting connectivity issues between Kali and your target machines. Use this video to ensure your Kali and other virtual machines have connectivity between them. In the
For VirtualBox Users
3 lectures35:35Video and lab - Creating a Virtual install of Kali using VirtualBox In this first lab, students will create a virtual install of Kali Linux using VMWare Player or VirtualBox depending on their host platform and personal preferences.Video and lab - Creating an Unattended Virtual Install of XP Using Virtualbox Windows XP is our victim or target for the labs. Though some of these labs will work using newer operating systems as targets, Windows XP is still relevant in roughly 75% of all networks making it a viable target.Video - Troubleshooting Connectivity Issues With Virtualization A short video on troubleshooting connectivity issues between Kali and your target machines. Use this video to ensure your Kali and other virtual machines have connectivity between them. In the
Video and lab - Creating a Virtual install of Kali using VirtualBox In this first lab, students will create a virtual install of Kali Linux using VMWare Player or VirtualBox depending on their host platform and personal preferences.
Video and lab - Creating a Virtual install of Kali using VirtualBox In this first lab, students will create a virtual install of Kali Linux using VMWare Player or VirtualBox depending on their host platform and personal preferences.
Video and lab - Creating a Virtual install of Kali using VirtualBox In this first lab, students will create a virtual install of Kali Linux using VMWare Player or VirtualBox depending on their host platform and personal preferences.
Video and lab - Creating a Virtual install of Kali using VirtualBox In this first lab, students will create a virtual install of Kali Linux using VMWare Player or VirtualBox depending on their host platform and personal preferences.
In this first lab, students will create a virtual install of Kali Linux using VMWare Player or VirtualBox depending on their host platform and personal preferences.
In this first lab, students will create a virtual install of Kali Linux using VMWare Player or VirtualBox depending on their host platform and personal preferences.
Video and lab - Creating an Unattended Virtual Install of XP Using Virtualbox Windows XP is our victim or target for the labs. Though some of these labs will work using newer operating systems as targets, Windows XP is still relevant in roughly 75% of all networks making it a viable target.
Video and lab - Creating an Unattended Virtual Install of XP Using Virtualbox Windows XP is our victim or target for the labs. Though some of these labs will work using newer operating systems as targets, Windows XP is still relevant in roughly 75% of all networks making it a viable target.
Video and lab - Creating an Unattended Virtual Install of XP Using Virtualbox Windows XP is our victim or target for the labs. Though some of these labs will work using newer operating systems as targets, Windows XP is still relevant in roughly 75% of all networks making it a viable target.
Video and lab - Creating an Unattended Virtual Install of XP Using Virtualbox Windows XP is our victim or target for the labs. Though some of these labs will work using newer operating systems as targets, Windows XP is still relevant in roughly 75% of all networks making it a viable target.
Windows XP is our victim or target for the labs. Though some of these labs will work using newer operating systems as targets, Windows XP is still relevant in roughly 75% of all networks making it a viable target.
Windows XP is our victim or target for the labs. Though some of these labs will work using newer operating systems as targets, Windows XP is still relevant in roughly 75% of all networks making it a viable target.
Video - Troubleshooting Connectivity Issues With Virtualization A short video on troubleshooting connectivity issues between Kali and your target machines. Use this video to ensure your Kali and other virtual machines have connectivity between them. In the
Video - Troubleshooting Connectivity Issues With Virtualization A short video on troubleshooting connectivity issues between Kali and your target machines. Use this video to ensure your Kali and other virtual machines have connectivity between them. In the
Video - Troubleshooting Connectivity Issues With Virtualization A short video on troubleshooting connectivity issues between Kali and your target machines. Use this video to ensure your Kali and other virtual machines have connectivity between them. In the
Video - Troubleshooting Connectivity Issues With Virtualization A short video on troubleshooting connectivity issues between Kali and your target machines. Use this video to ensure your Kali and other virtual machines have connectivity between them. In the
A short video on troubleshooting connectivity issues between Kali and your target machines. Use this video to ensure your Kali and other virtual machines have connectivity between them. In the
A short video on troubleshooting connectivity issues between Kali and your target machines. Use this video to ensure your Kali and other virtual machines have connectivity between them. In the
For VMWare Users
3 lectures32:03Video and lab - Creating a Virtual install of Kali Using VMWare In this first lab, students will create a virtual install of Kali Linux using VMWare Player or Virtualbox depending on their host platform and personal preferences.Video and Lab - Creating an Unattended Virtual Install of XP Using VMWare Windows XP is our victim or target for the labs. Though some of these labs will work using newer operating systems as targets, Windows XP is still relevant in roughly 75% of all networks making it a viable target.Video- Troubleshooting Connectivity Issues! A short video on troubleshooting connectivity issues between Kali and your target machines. Use this video to ensure your Kali and other virtual machines have connectivity between them.
For VMWare Users
3 lectures32:03Video and lab - Creating a Virtual install of Kali Using VMWare In this first lab, students will create a virtual install of Kali Linux using VMWare Player or Virtualbox depending on their host platform and personal preferences.Video and Lab - Creating an Unattended Virtual Install of XP Using VMWare Windows XP is our victim or target for the labs. Though some of these labs will work using newer operating systems as targets, Windows XP is still relevant in roughly 75% of all networks making it a viable target.Video- Troubleshooting Connectivity Issues! A short video on troubleshooting connectivity issues between Kali and your target machines. Use this video to ensure your Kali and other virtual machines have connectivity between them.
Video and lab - Creating a Virtual install of Kali Using VMWare In this first lab, students will create a virtual install of Kali Linux using VMWare Player or Virtualbox depending on their host platform and personal preferences.
Video and lab - Creating a Virtual install of Kali Using VMWare In this first lab, students will create a virtual install of Kali Linux using VMWare Player or Virtualbox depending on their host platform and personal preferences.
Video and lab - Creating a Virtual install of Kali Using VMWare In this first lab, students will create a virtual install of Kali Linux using VMWare Player or Virtualbox depending on their host platform and personal preferences.
Video and lab - Creating a Virtual install of Kali Using VMWare In this first lab, students will create a virtual install of Kali Linux using VMWare Player or Virtualbox depending on their host platform and personal preferences.
In this first lab, students will create a virtual install of Kali Linux using VMWare Player or Virtualbox depending on their host platform and personal preferences.
In this first lab, students will create a virtual install of Kali Linux using VMWare Player or Virtualbox depending on their host platform and personal preferences.
Video and Lab - Creating an Unattended Virtual Install of XP Using VMWare Windows XP is our victim or target for the labs. Though some of these labs will work using newer operating systems as targets, Windows XP is still relevant in roughly 75% of all networks making it a viable target.
Video and Lab - Creating an Unattended Virtual Install of XP Using VMWare Windows XP is our victim or target for the labs. Though some of these labs will work using newer operating systems as targets, Windows XP is still relevant in roughly 75% of all networks making it a viable target.
Video and Lab - Creating an Unattended Virtual Install of XP Using VMWare Windows XP is our victim or target for the labs. Though some of these labs will work using newer operating systems as targets, Windows XP is still relevant in roughly 75% of all networks making it a viable target.
Video and Lab - Creating an Unattended Virtual Install of XP Using VMWare Windows XP is our victim or target for the labs. Though some of these labs will work using newer operating systems as targets, Windows XP is still relevant in roughly 75% of all networks making it a viable target.
Windows XP is our victim or target for the labs. Though some of these labs will work using newer operating systems as targets, Windows XP is still relevant in roughly 75% of all networks making it a viable target.
Windows XP is our victim or target for the labs. Though some of these labs will work using newer operating systems as targets, Windows XP is still relevant in roughly 75% of all networks making it a viable target.
Video- Troubleshooting Connectivity Issues! A short video on troubleshooting connectivity issues between Kali and your target machines. Use this video to ensure your Kali and other virtual machines have connectivity between them.
Video- Troubleshooting Connectivity Issues! A short video on troubleshooting connectivity issues between Kali and your target machines. Use this video to ensure your Kali and other virtual machines have connectivity between them.
Video- Troubleshooting Connectivity Issues! A short video on troubleshooting connectivity issues between Kali and your target machines. Use this video to ensure your Kali and other virtual machines have connectivity between them.
Video- Troubleshooting Connectivity Issues! A short video on troubleshooting connectivity issues between Kali and your target machines. Use this video to ensure your Kali and other virtual machines have connectivity between them.
A short video on troubleshooting connectivity issues between Kali and your target machines. Use this video to ensure your Kali and other virtual machines have connectivity between them.
A short video on troubleshooting connectivity issues between Kali and your target machines. Use this video to ensure your Kali and other virtual machines have connectivity between them.
Anonymity - Remaining Anonymous While Hacking Online
3 lectures28:01Video and Lab – Remaining Anonymous Online using TOR and Proxychains In this lab, you will learn how to stay anonymous while hacking online using TOR and Proxychains. Remaining anonymous while hacking is easy, it just requires some configuration which you will learn in this lab.Video and Lab - Setup a free VPN Using Kali Linux In this lab, students will use a free VPN service to create a secure connection and provide anonymity while accessing the Internet. VPNs are one of the best options for protecting your privacy, encrypting your data, and changing your geolocation. There is no 100% anonymity on the Internet but using the right tools and services can provide at least 60 -80% assurance of privacy. VPNs are great if you want to encrypt your data while using an unsecured network such as a public Wi-Fi or you need to circumvent a restricted or censored network. If you are taking a three-day trip to Russia or China and need to be able to access content that is being blocked, a VPNs that can do this.Video and Lab - Using anonsurf on Kali Linux to Stay Anonymous In this lab, you will learn how to hide your identity on the Internet using anonsurf. Anonsurf is a script made by the ParrotSec team that completely anonymizes you with just one click of a button using TOR proxies. Anonsurf automatically routes ALL your traffic through TOR, including your DNS requests to prevent DNS leaks.
Anonymity - Remaining Anonymous While Hacking Online.
3 lectures28:01Video and Lab – Remaining Anonymous Online using TOR and Proxychains In this lab, you will learn how to stay anonymous while hacking online using TOR and Proxychains. Remaining anonymous while hacking is easy, it just requires some configuration which you will learn in this lab.Video and Lab - Setup a free VPN Using Kali Linux In this lab, students will use a free VPN service to create a secure connection and provide anonymity while accessing the Internet...
Additional information
Complete Module 01 - Virtual Network Lab Build
A laptop or desktop capable of running two simultaneous virtual installs in conjunction with their host operating system
Basic networking skills, IP addressing, familiarization with ports and services, configure a network adapter, use PING, IFCONFIG, IPCONFIG
Reliable LAN or cable connection for Internet access
A host machine running Windows 7, 8.1 or 10 (preferred). MAC and Apple machines will work but a Windows host is preferred
A minimum of 4 GB of RAM (8 GB preferred)
Basic computer fundamentals
Basic operating system fundamentals