SecOps Tool Landscape: The Kali Linux Security Platform

Kali Linux 2022.2    |    Intermediate
  • 13 videos | 1h 22m 1s
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 14 users Rating 4.8 of 14 users (14)
The Kali Linux operating system comes with many pre-installed security tools. It is a popular choice among penetration testers and its tools can be used to assess the security of network devices and systems. In this course, learn the benefits of Kali Linux and how to download and install it. Next, explore the Kali Linux user interface and work with some of its tools. Finally, discover how to use common tools in Kali for various operations, such as Nmap for port scanning, Hydra for compromising a system, sqlmap for performing SQL injection attacks, and Ophcrack for cracking passwords. Upon completion, you'll be able to recognize the benefits of Kali Linux, download and install it, and use various Kali tools to execute testing tasks.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify what kali linux is and why it is useful
    Recognize why many modern security professionals use kali linux
    Outline some of the reasons why kali linux may not be a good fit
    Download kali linux
    Install kali linux on a virtual machine
    Explore the kali linux user interface and launch different tools
  • Install additional tools in kali linux
    Perform a port scan using nmap in kali linux
    Compromise a system with hydra
    Perform a sql injection attack using sqlmap
    Crack passwords with ophcrack
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 54s
  • 5m 37s
  • Locked
    3.  The Value of Kali Linux
    4m 50s
  • Locked
    4.  Reasons Not to Use Kali Linux
    2m 13s
  • Locked
    5.  Downloading Kali Linux
    4m 41s
  • Locked
    6.  Installing Kali Linux on a Virtual Machine
    7m 22s
  • Locked
    7.  Exploring the Kali Linux User Interface and Tools
    7m 2s
  • Locked
    8.  Installing Additional Tools in Kali Linux
    3m 38s
  • Locked
    9.  Performing a Port Scan Using Nmap
    14m 18s
  • Locked
    10.  Compromising a System with Hydra
    10m 44s
  • Locked
    11.  Performing a SQL Injection Attack Using sqlmap
    12m 32s
  • Locked
    12.  Cracking Passwords with Ophcrack
    7m 23s
  • Locked
    13.  Course Summary
    49s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 21 users Rating 4.6 of 21 users (21)
Rating 4.6 of 7 users Rating 4.6 of 7 users (7)
Rating 4.5 of 39 users Rating 4.5 of 39 users (39)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 17 users Rating 4.8 of 17 users (17)
Rating 4.5 of 21 users Rating 4.5 of 21 users (21)
Rating 4.6 of 4247 users Rating 4.6 of 4247 users (4247)