- Require patience and time to spend on this course.
- Basic IT Skill, Example: Being able to use a computer device at a beginner level.
- Basic understanding of IP Networking (would be helpful)
- Good computer with atleast 4GB RAM and relaible internet connnection
Kali is a penetration testing Linux distribution created by Offensive Security. It holds a repository of multiple tools for security-related engineers including hacking wireless networks, web applications, databases, Reverse engineering, password crackers, and much more! As you can see, Kali is a versatile and powerful tool for anyone looking to do any cybersecurity-related work.
Keep in mind this is a basics course, which means this course is a beginner’s guide to getting started in Kali…to get your feet wet. The course is broken down into several sections focusing on certain aspects of the ethical hacking process. Starting off with an overview of Kali and its use cases then offer a step-by-step walkthrough of installing Kali using VMware. Next, we teach you some important configuration settings in the distribution including configuring your network and managing services in Kali. Knowing these procedures will help you set up the proper environments when using Kali and its tools.
We will cover the five phases and the tools used in each phase, again this is an introduction so we may not go super in-depth but you will leave with a basic understanding of how to do things and why they are done in each phase. Because of issues with Udemy free courses being less than two hours I am not able to add additional content. However, I will be publishing more free courses. I will be publishing a more focused Course on each of the phases.
The goal is to provide you with basic knowledge to get you started so you can take it from there. Remember this is not a field that you have can walkthrough. You will have to grow and adapt as the environment changes.
Who this course is for:
- Anybody who want to learn about Ethical Hacking
- Any person willing to learn how to make their own penetration testing lab