Hiện đang trống: 0 ₫
![Breadcrumb Abstract Shape](https://udefree.com/wp-content/themes/edublink/assets/images/shapes/breadcrumb-shape-1.png)
![Breadcrumb Abstract Shape](https://udefree.com/wp-content/themes/edublink/assets/images/shapes/breadcrumb-shape-2.png)
![Breadcrumb Abstract Shape](https://udefree.com/wp-content/themes/edublink/assets/images/shapes/breadcrumb-shape-3.png)
What you’ll learn
-
Setup your own virtual penetration testing lab
-
Completely anonymize your online and hacking activity
-
Setup a VPN with Kali Linux
-
Setup Proxychains and a VPN for maximum anonymity and minimum DNS leaks
-
Use the Linux terminal for Ethical Hacking
-
Setup Terminal alternatives to boost productivity
-
Understand the networking fundamentals behind ethical hacking and penetration testing
-
Understand the OSI layer
-
Understand the 3 way TCP handshake
-
Grasp the usaage of Nmap for information gathering
-
Understand the Nmap syntax for a variety of scans
-
Use Nmap for advanced discovery
-
Use Nmap for advanced information gathering
-
Understand the Metasploit syntax for ethical hacking
-
Understand the Metasploit terminology used for penetration testing and ethical hacking
-
Perform exploitation with Metasploit
-
Install the Metasploit community Web GUI edition
-
Web server hacking with Metasploit
-
FTP Backdoor exploitation
-
Using Nikto Web vulnerability scanner
-
WordPress hacking
-
Using WPScan
-
Password cracking with John The Ripper
-
BeEF browser exploitation
-
Bruteforce attacks
-
Arimtage
-
Using Veil Evasion
-
Generating Wordlists
-
Using Netcat
-
Arp spoofing
-
Arp poisoning
-
WPA/WPA2 cracking with aircrack-ng
-
WPA/WPA2 cracking with airgeddon
-
DDoS Attacks
-
Network sniffing with Wireshark
-
Meterpreter
-
Generating backdoors
-
Using RAT’s