Linux and Windows Pentesting with Python and Kali
Release Date:June 7, 2021
Video Learning Path OverviewA Learning Path is a specially tailored course that brings together two or more different topics that lead you to achieve an end goal. Much thought goes into the selection of the assets for a Learning Path, and this is done through a complete understanding of the requirements to achieve a goal. As hackers become more skilled and sophisticated, it puts the responsibility of business owners to ensure that their cybersecurity systems can protect against threats. One of the most important techniques that companies can use to defend themselves is penetration testing. This Learning Path is architected to help you not only learn about the threats and safeguarding network, websites but also learn how to penetrate and gain access into the targets system. Beginning with an introduction to penetration testing on the most vulnerable OS, Windows, using Kali Linux you will practically learn to gather information about the target network and websites to discover all the vulnerable ports. Moving on, youll break into websites using various pentesting tools and learn how to present your test reports. Once you are comfortable in using Kali Linux and its well-known tools, youll explore another fantastic tool, the Python language. Youll learn to implement hacking tools and techniques such as debuggers, fuzzers, etc. Furthermore, youll be excited in learning to extend the popular Burp Suite web-hacking tool to perform a man-in-the-browser attack, and exfiltrate data from a network most sneakily. This three-piece-Learning-Path is a practical approach with step by step guide to teach you to use Kali Linux tools along with python scripts. It then helps you exploring the key topics incisively with the combined use of theory and practical demonstrations to help the viewer get a broad understanding of the topic. Key FeaturesDiscover the vast features and programs that Kali Linux holds to perform and carry out a variety of penetration testing tasks. Exploit the most common vulnerabilities in the Windows operating system and understand how attackers take advantage of them. Develop the skills to write and implement Python Scripts to Pentest Linux and Windows Machines. Author BiosAngelique Keyter is devoted to making a difference in the world of cybercrime. She has numerous years of hacking and lecturing behind her and focuses her time on making a difference in her community and teaching people how to fight an unseen criminal. Angelique is a certified hacker, Linux professional, and Microsoft solutions expert with more than 20 years of experience. She is a mother of twins and spends a lot of time studying new things and learning new concepts. She believes that you are never too old to learn. She has a passion for gaming and geeky stuff from hacking to robotics to forensic psychology. She is a focused person with a witty sense of humor, always ready to help or play football with her boys. Sunil Gupta is a Certified Ethical Hacker. Currently, he teaches 50,000+ students online in 170+ countries. He is a specialist in the Ethical Hacking Area. His strengths are Vulnerability Assessment, Penetration Testing, Bug Bounty Hunting, Intrusion Detection, Risk Identification, Data Analysis Report, and Briefing.