Ethical Hacking – A Hands-On Approach to Ethical Hacking – Available Now !!!
Sale Page:
Value: 197
You just pay: 16
Status: This item is available
Description:
What you’ll learn
Use virtualization as it applies to penetration testing.
Discover, scan and exploit network vulnerabilities.
Demonstrate the ability to perform an entry level penetration test.
Requirements
Complete Module 01 – Virtual Network Lab Build
A laptop or desktop capable of running two simultaneous virtual installs in conjunction with their host operating system.
Basic networking skills, IP addressing, familarization with ports and servcies, configure a network adpater, use PING, IFCONFIG, IPCONFIG
Relaible LAN or cable connection for Internet access.
A host machine running Windows 7, 8.1 or 10 (preferred). MAC and Apple machines will work but a Windows host is prefered.
A minimum of 4 GB of RAM (8 GB preferred)
Basic computer fundamentals.
Basic operating system fundamentals.
Description
New! Now with Capture the Flag Exercises!
Course Overview
.
This course provides a fundamental look at offensive security concepts and techniques using a virtual install of Kali Linux and three different target victims, Windows XP, Server 2008 and Linux (Metesploitable2). This course provides a 100% hands-on on approach to learning to be an ethical hacker or a pentester.
Please kindly contact us if you need proof of item.
Everything‘s good | Ethical Hacking – A Hands-On Approach to Ethical Hacking