Kali Linux - Backtrack Evolved: Assuring Security by Penetration Testing [Video]

Code Files

Kali Linux - Backtrack Evolved: Assuring Security by Penetration Testing [Video]

Justin Hutchens

3 customer reviews
Secure your networks against attacks, hacks, and intruders with this fast paced and intensive security course using Kali Linux
Packt Subscription
$5.00
$9.99/m after first month
Video
$5.00
RRP $84.99
Save 94%
What do I get with a Packt subscription?
  • Exclusive monthly discount - no contract
  • Unlimited access to entire Packt library of 6500+ eBooks and Videos
  • 120 new titles added every month, on new and emerging tech
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the subscription reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the subscription reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the subscription reader
$5.00
$5.00
$9.99/m after first month
RRP $84.99
Subscription
Video
Subscribe Now

Frequently bought together


Kali Linux - Backtrack Evolved: Assuring Security by Penetration Testing [Video] Book Cover
Kali Linux - Backtrack Evolved: Assuring Security by Penetration Testing [Video]
$ 84.99
$ 5.00
Practical DevOps Security [Video] Book Cover
Practical DevOps Security [Video]
$ 124.99
$ 5.00
Buy 2 for $10.00
Save $199.98
Add to Cart

Video Description

Kali Linux is the latest Linux distribution from Offensive Security, custom-built for the distinct purposes of performing network security audits and forensic investigations. Kali comes fully loaded with hundreds of integrated tools to perform every aspect of a penetration test.

Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide helps you to develop practical and useful professional skills in the information security industry, while simultaneously delivering the high level of excitement and exhilaration that goes hand-in-hand with the world of computer and network hacking.

Cyber-crime is on the rise and information security is becoming more paramount than ever before. A single attack on a company’s network infrastructure can often result in irreparable damage to a company’s assets and/or reputation.

It is no longer sufficient to merely rely on traditional security measures. In order to ensure the security of critical information assets, it is essential to become familiar with the strategies, tactics, and techniques that are used by actual hackers who seek to compromise your network.

Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide will prepare you to enter the world of professional hacking by ensuring that you are well versed with the skills needed and tools used to compromise the security of enterprise networks and information systems.

Style and Approach

Packt video courses are designed to cover the breadth of the topic in short, hands-on, task-based videos. Each course is divided into short manageable sections, so you can watch the whole thing or jump to the bit you need. The focus is on practical instructions and screencasts showing you how to get the job done.

Many advanced techniques are addressed within this series, but it is still designed to simultaneously accommodate less experienced viewers. The series provides detailed explanations intended to clearly address the underlying processes involved with all tasks performed.

Video Preview

What You Will Learn

  • Prepare a fully-functional and low-budget security lab, where you can practice and develop your penetration testing skills without fear of legal consequence
  • Gather information about a target with advanced reconnaissance techniques
  • Identify target systems on a network using host discovery tools
  • Identify services running on target systems by scanning and enumeration
  • Discover vulnerabilities to determine potential attack vectors
  • Launch automated exploits and payloads using the Metasploit Framework
  • Learn a variety of hands-on techniques to exploit target systems
  • Establish backdoors to ensure continued access
  • Escalate privileges to acquire maximum control over compromised systems

Authors

Video Details

ISBN 139781782162926
Course Length2 hours 44 minutes
Read More
From 3 reviews

Read More Reviews

Recommended for You

Practical DevOps Security [Video] Book Cover
Practical DevOps Security [Video]
$ 124.99
$ 5.00
Getting Actionable Insights from Power BI [Video] Book Cover
Getting Actionable Insights from Power BI [Video]
$ 124.99
$ 5.00
Skeletons vs Zombies MOBA With Multiplayer in Unity [Video] Book Cover
Skeletons vs Zombies MOBA With Multiplayer in Unity [Video]
$ 99.99
$ 5.00
Cinematics and Animations in Unity [Video] Book Cover
Cinematics and Animations in Unity [Video]
$ 99.99
$ 5.00
Learn to Build Alexa Flash Briefing Skills With No Coding [Video] Book Cover
Learn to Build Alexa Flash Briefing Skills With No Coding [Video]
$ 31.99
$ 5.00
Introduction to HTML: A Complete Beginner to Expert Course [Video] Book Cover
Introduction to HTML: A Complete Beginner to Expert Course [Video]
$ 90.99
$ 5.00