Oreilly - Ethical Hacking - Learning the Basics
by Sunil Gupta | Publisher: Apress | Release Date: November 2018 | ISBN: 9781484243480
Go through the basics of network security and penetration testing to begin your journey to becoming an ethical hacker: a skilled professional who looks for weaknesses and vulnerabilities in software systems and uses this knowledge to defend them from external breaches. You will learn the concepts of ethical hacking and look at issues from a hacker's perspective. The video is divided into six sections, covering various aspects of ethical hacking for a beginner to grasp. Starting with an introduction to the basics of ethical hacking, you will go through common terminologies used and also learn to install your first virtual machine. You will then take a look at various Linux terminal commands and also learn to perform basic operations with them. The following sections will introduce footprinting and vulnerability scanning, where you will learn how these processes work by going through examples. In conclusion, you will learn what exploitation is and how a minor vulnerability in the system can lead to a breach. What You Will LearnGain a basic understanding of ethical hackingSet up your first virtual machineGet acquainted with Linux terminal commands Carry out network and web penetration testingSpot vulnerabilities in the software systemWho This Video Is ForAnybody who is interested in learning ethical hacking/penetration testing and who wants to learn how to secure their websites and networks from hackers.
- Introduction to Ethical Hacking 00:03:53
- Basics 00:03:54
- Ethical Hacking Terminologies 00:03:54
- Lab Setup 00:04:04
- Installation of Virtual Machine 00:04:04
- Installation of Windows and Kali Linux 00:07:32
- Linux Basics 00:03:47
- Common Linux Terminal Commands 00:03:47
- Basic Operations in Linux 00:04:44
- Footprinting 00:02:41
- Footprinting Basics 00:02:41
- Footprinting Example 00:08:04
- Vulnerability Scanning 00:02:21
- Scanning Basics 00:02:21
- Scanning Example 00:10:34
- Exploitation 00:03:05
- Exploitation Basics 00:03:05
- Exploitation Attack 00:10:48
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.