Kali Linux - Backtrack Evolved: Assuring Security by Penetration Testing [Video]

Code Files

Kali Linux - Backtrack Evolved: Assuring Security by Penetration Testing [Video]

Justin Hutchens

3 customer reviews
Secure your networks against attacks, hacks, and intruders with this fast paced and intensive security course using Kali Linux
Mapt Subscription
FREE
$30.00/m after trial
Video
$12.75
RRP $84.99
Save 84%
What do I get with a Mapt subscription?
  • Unlimited access to all Packt’s 6,000+ eBooks and Videos
  • 100+ new titles a month, learning paths, assessments & code files
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the subscription reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the subscription reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the subscription reader
$0.00
$12.75
$29.99 p/m after trial
RRP $84.99
Subscription
Video
Start 14 Day Trial

Frequently bought together


Kali Linux - Backtrack Evolved: Assuring Security by Penetration Testing [Video] Book Cover
Kali Linux - Backtrack Evolved: Assuring Security by Penetration Testing [Video]
$ 84.99
$ 12.75
Qt5 Python GUI Programming Cookbook Book Cover
Qt5 Python GUI Programming Cookbook
$ 39.99
$ 8.00
Buy 2 for $20.75
Save $104.23
Add to Cart

Video Description

Kali Linux is the latest Linux distribution from Offensive Security, custom-built for the distinct purposes of performing network security audits and forensic investigations. Kali comes fully loaded with hundreds of integrated tools to perform every aspect of a penetration test.

Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide helps you to develop practical and useful professional skills in the information security industry, while simultaneously delivering the high level of excitement and exhilaration that goes hand-in-hand with the world of computer and network hacking.

Cyber-crime is on the rise and information security is becoming more paramount than ever before. A single attack on a company’s network infrastructure can often result in irreparable damage to a company’s assets and/or reputation.

It is no longer sufficient to merely rely on traditional security measures. In order to ensure the security of critical information assets, it is essential to become familiar with the strategies, tactics, and techniques that are used by actual hackers who seek to compromise your network.

Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide will prepare you to enter the world of professional hacking by ensuring that you are well versed with the skills needed and tools used to compromise the security of enterprise networks and information systems.

Style and Approach

Packt video courses are designed to cover the breadth of the topic in short, hands-on, task-based videos. Each course is divided into short manageable sections, so you can watch the whole thing or jump to the bit you need. The focus is on practical instructions and screencasts showing you how to get the job done.

Many advanced techniques are addressed within this series, but it is still designed to simultaneously accommodate less experienced viewers. The series provides detailed explanations intended to clearly address the underlying processes involved with all tasks performed.

Video Preview

What You Will Learn

  • Prepare a fully-functional and low-budget security lab, where you can practice and develop your penetration testing skills without fear of legal consequence
  • Gather information about a target with advanced reconnaissance techniques
  • Identify target systems on a network using host discovery tools
  • Identify services running on target systems by scanning and enumeration
  • Discover vulnerabilities to determine potential attack vectors
  • Launch automated exploits and payloads using the Metasploit Framework
  • Learn a variety of hands-on techniques to exploit target systems
  • Establish backdoors to ensure continued access
  • Escalate privileges to acquire maximum control over compromised systems

Authors

Video Details

ISBN 139781782162926
Course Length2 hours 44 minutes
Read More
From 3 reviews

Read More Reviews

Recommended for You

Qt5 Python GUI Programming Cookbook Book Cover
Qt5 Python GUI Programming Cookbook
$ 39.99
$ 8.00
A JQuery Wack a Mole Exercise [Video] Book Cover
A JQuery Wack a Mole Exercise [Video]
$ 93.99
$ 14.10
A JavaScript Game Exercise Built from Scratch to Catch Objects [Video] Book Cover
A JavaScript Game Exercise Built from Scratch to Catch Objects [Video]
$ 186.99
$ 28.05
Mastering Unsupervised Learning with Python [Video] Book Cover
Mastering Unsupervised Learning with Python [Video]
$ 124.99
$ 18.75
Learning Amazon Web Services [Video] Book Cover
Learning Amazon Web Services [Video]
$ 124.99
$ 18.75
Retargeting and Remarketing: The Ultimate Guide Made Easy [Video] Book Cover
Retargeting and Remarketing: The Ultimate Guide Made Easy [Video]
$ 92.99
$ 13.95