KALI Linux For Hacking

Learn KALI Linux to Enhance Your Hacking Skills

5h 8m19 lectures1 sections

What you'll learn

  • Learn to install Kali Linux
  • Understand basic commands
  • Manage users and permissions
  • Use tools to enhance privacy
  • Apply advanced hacking techniques
  • Analyze cybersecurity environments

About this course

Linux is one of the most popular operating systems used in security and penetration testing, providing users with complete control over the system and access to a wide range of useful tools and programs. In this course, participants will learn the fundamentals of using Linux and various tools for vulnerability analysis and system security. Common penetration techniques and defense strategies will also be discussed. Participants will gain knowledge of security and penetration basics and how to use Linux in this field, which will be beneficial for information security professionals, developers, system administrators, and those interested in network security and cloud computing.

Expected outcomes

  • Master the fundamentals of using Linux for ethical hacking.
  • Ability to manage systems using command-line in Linux.
  • Understand how to handle permissions and users in Linux environment.
  • Enhance privacy using advanced tools in Linux.

Course content

1

KALI Linux For Hacking

19 lectures
  1. Installing Kali Linux Distribution15:14
  2. Updating and Upgrading Kali Linux4:42
  3. Some Shortcuts in Linux for Easier Use8:27
  4. Explaining the GUI of Linux13:34
  5. Commands in Linux (Part One)20:12
  6. Commands in Linux (Part Two)21:02
  7. Commands in Linux (Part Three)16:00
  8. Commands in Linux (Part Four)17:32
  9. Commands in Linux (Part Five)22:56
  10. Explaining Special Characters in Linux20:14
  11. Redirection _ Pipe26:51
  12. Understanding Environment Variables16:09
  13. User and Account Management in Linux20:42
  14. Difference Between Sudo and SU9:34
  15. File Permissions21:25
  16. Explaining Services and Processes19:51
  17. Installing Applications15:27
  18. Explaining tor and Proxychain9:55
  19. Resources to Learn More8:52

Instructor

Eng. Ahmed Faheem

Eng. Ahmed Faheem

Information security engineer with extensive experience in security and penetration testing for various companies.
5,130 students1 courses

This course is part of the diploma

  • Advanced Cybersecurity DiplomaDiploma
    4.6|7|35 h

    Advanced Cybersecurity Diploma

    7 courses
    $59.99
    Buy now

Related courses

  • CCNA Cisco Network
    4.6|5,045|5h 57m

    CCNA Cisco Network

    Network Installation and Management Skills

    Eng. Ahmed Haykal
    Eng. Ahmed Haykal
    $19.99
    Buy now
  • Linux Operating Systems
    4.7|4,954|14h 25m

    Linux Operating Systems

    Learn and Master Linux Operating Skills

    Eng. Ahmed Haykal
    Eng. Ahmed Haykal
    $19.99
    Buy now
  • Cyber Security Fundamentals
    4.9|5,485|13h 6m

    Cyber Security Fundamentals

    Comprehensive Professional Course in Information Security

    Eng. Moamen Mohamed
    Eng. Moamen Mohamed
    $19.99
    Buy now
  • WiFi Hacking and Security
    4.9|5,234|3h 44m

    WiFi Hacking and Security

    Master Network Vulnerability Discovery

    Eng. Kanaan Al-Hallaj
    Eng. Kanaan Al-Hallaj
    $19.99
    Buy now