Lynda - Introduction to Kali Linux
- کاربرد : آموزش لینوکس کالی - Kali Linux
- نوع فایل : فیلم آموزشی
- زبان : انگلیسی
- سیستم عامل : Windows-Mac-Linux-Android-iOS
- تولید کننده : Lynda
- سال تولید : 2017
توضیحات
یکی از توریع های لینوکس است که توجه اکثر هکرها را به خود جذب کرده، این سیستم عامل قدرتمند با نماد اژدها به جای سیستم عامل بک ترک نشسته و بیشتر برای تست نفوذ استفاده می شود این توزیع به پشتوانه ی Debian منتشر شده و حتی از روی usb فلش هم قابل اجراست با Kali Linux شما می توانید به انواع شبکه ها، وب سایت ها، تلفن های همراه، تلبت ها و به راحتی نفوذ کنید و از هک لذت ببرید Kali مجموعه ای از محبوب ترین ابزارهای آزمون نفوذ متن باز است که در برگیرنده ابزارهای آزمون نفوذ، جمع آوری اطلاعات و ارزیابی امنیت از قبیل NMAP (پویشگر پورت)، Wireshark (تحلیل بسته ها)، John the Ripper (شکستن کلمه های عبور)، Aircrack-ng (آزمون نفوذ به WLANها) و می باشد
Description
Kali Linux is a flavor of Linux targeted at digital forensics experts and penetration (pen) testers It includes over 400 pen-testing programs, and it is the primary tool used by ethical hackers Using Kali Linux, certified ethical hackers can test networks on their organizations' behalves, to see if they're vulnerable to outside attacks
This course will give prospective ethical hackers a short overview of the tools in Kali Linux Cybersecurity expert Malcolm Shore shows how to set up a virtual environment for testing, configure Kali Linux, and install toolsets for information gathering, vulnerability assessment, password and hash cracking, and target exploitation
Because businesses are connected, they are also exposed Vulnerability testing helps organizations limit that exposure This course will help you explore the careers, techniques, and tools behind ethical hacking—one of the most competitive and sought-after IT security skills
Topics include:
Overview of Metaploit, Maltego, and Wifite
Setting up a virtual lab with Oracle VM
Installing virtual machines and appliances
Exploring the Kali Linux applications
Gathering information with DMitry and DNSenum
Conducting a vulnerability assessment
Installing OpenVAS and Vega
Testing passwords
Exploiting targets
This course will give prospective ethical hackers a short overview of the tools in Kali Linux Cybersecurity expert Malcolm Shore shows how to set up a virtual environment for testing, configure Kali Linux, and install toolsets for information gathering, vulnerability assessment, password and hash cracking, and target exploitation
Because businesses are connected, they are also exposed Vulnerability testing helps organizations limit that exposure This course will help you explore the careers, techniques, and tools behind ethical hacking—one of the most competitive and sought-after IT security skills
Topics include:
Overview of Metaploit, Maltego, and Wifite
Setting up a virtual lab with Oracle VM
Installing virtual machines and appliances
Exploring the Kali Linux applications
Gathering information with DMitry and DNSenum
Conducting a vulnerability assessment
Installing OpenVAS and Vega
Testing passwords
Exploiting targets