This course will teach you hacker's mindset. You will see all the steps which must be performed for successful attack using Metasploit on Kali. If you want to know how security mechanisms of Windows and Linux work and you want to know how to bypass them this course is definitly for you.
All the lessons are well structured and contain actual infromation. That means that all techniques represented in the course still work on modern system.
I am going to keep the content updated and also on the regular basis am going to add new lessons and assignments for my students.
Given course is intended was everyone who is interested in Ethical hacking and Cyber security. It will be useful and helpful for beginners and professionals. Beginners will understand hot to orient in learning Information security and it will help them to structure their studying process.
What will you learn?
After completing the course you will get the following skills and knowledge:
· Skills to manage Windows and Linux using console commands
· All the steps of hacking remote system
· Different port and vulnerability scanning methods of network devices
· You will learn how to attack Windows and Linux systems using different methods
· You will understand how to protect your system against different attacks
Course structure:
· Lab preparation. We will install different Windows and Linux systems.
· Metasploit framework introduction. In given section you will understand how to work with Metasploit, how to perform network attacks, how to collect information about your victim.
· Information gathering. Before attacking remote system it is vital to collect as more information as possible about your target. In this section you will get some techniques.
· Scanning. Here we will discuss how to get more information about running services on remote systems and possible vulnerabilities in Operating system and applications.
· Access gaining. In this section I explain different techniques to get access to remote system. All described techniques still work on real system.
· Access maintaining and Post exploitation. Here you will understand how escalate your privileges on the hacked system, how to hack passwords, how to install backdoors for further remote management and many other things