Oreilly - Ethical Hacking - Learning the Basics - 9781484243480
Oreilly - Ethical Hacking - Learning the Basics
by Sunil Gupta | Publisher: Apress | Release Date: November 2018 | ISBN: 9781484243480


Go through the basics of network security and penetration testing to begin your journey to becoming an ethical hacker: a skilled professional who looks for weaknesses and vulnerabilities in software systems and uses this knowledge to defend them from external breaches. You will learn the concepts of ethical hacking and look at issues from a hacker's perspective. The video is divided into six sections, covering various aspects of ethical hacking for a beginner to grasp. Starting with an introduction to the basics of ethical hacking, you will go through common terminologies used and also learn to install your first virtual machine. You will then take a look at various Linux terminal commands and also learn to perform basic operations with them. The following sections will introduce footprinting and vulnerability scanning, where you will learn how these processes work by going through examples. In conclusion, you will learn what exploitation is and how a minor vulnerability in the system can lead to a breach. What You Will LearnGain a basic understanding of ethical hackingSet up your first virtual machineGet acquainted with Linux terminal commands Carry out network and web penetration testingSpot vulnerabilities in the software systemWho This Video Is ForAnybody who is interested in learning ethical hacking/penetration testing and who wants to learn how to secure their websites and networks from hackers. 
  1. Introduction to Ethical Hacking 00:03:53
  2. Basics 00:03:54
  3. Ethical Hacking Terminologies 00:03:54
  4. Lab Setup 00:04:04
  5. Installation of Virtual Machine 00:04:04
  6. Installation of Windows and Kali Linux 00:07:32
  7. Linux Basics 00:03:47
  8. Common Linux Terminal Commands 00:03:47
  9. Basic Operations in Linux 00:04:44
  10. Footprinting 00:02:41
  11. Footprinting Basics 00:02:41
  12. Footprinting Example 00:08:04
  13. Vulnerability Scanning 00:02:21
  14. Scanning Basics 00:02:21
  15. Scanning Example 00:10:34
  16. Exploitation 00:03:05
  17. Exploitation Basics 00:03:05
  18. Exploitation Attack 00:10:48
  19. Oreilly - Ethical Hacking - Learning the Basics


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss