Take this
course

Software Development / Security & Encryption

Configuring Linux for Pentesting

The student will be learning the various phases of penetration testing on Linux and the tools that are used for each phase paired with several demonstrations.

Description

Linux has been the number one OS used for hacking and penetration testing. In our course, Configuring Linux for Pentesting, the student will be learning the various phases of penetration testing on Linux and the tools that are used for each phase. 


In this Configuring Linux for Pentesting  course will be paired with demos on apt-get, Essential Tools and GUI, Iptables, and IP forwarding.  


Topics Covered Include:

  • Configuring Linux for Pentesting
  • Pentesting on Linux  

Take Advantage of our extra downloadable supplemental materials.

**This .zip file includes PDF versions of our Script, PPT Slides, Quiz Questions, and vocabulary tools to better enhance your understanding for Configuring Linux for Pentesting.

Full details

Curriculum

  • Configuring Linux for Pentesting
    Installing Applications
    2:06
    DEMO: apt-get
    3:08
  • Pentesting on Linux
    Applications for Pentesting
    1:43
    DEMO: Essential Tools and GUI
    7:56
    Iptables
    1:01
    DEMO: Iptables
    9:27
    DEMO: IP Forwarding
    3:02
  • Conclusion
    Conclusion
    0:55
    Configuring Linux for Pentesting: Supplemental Materials
    Take advantage of all our extra downloadable supplemental materials. This .zip file includes PDF versions of our Script, PPT Slides, Quiz Questions, and vocabulary tools to better enhance your understanding for Configuring Linux for Pentesting Chapters 1 & 2.

Skills

  • Information Systems Security
  • IT Security
  • Information Security
  • Certified Ethical Hacker (CEH)
  • CompTIA Linux+
  • CompTIA Security+
  • IT Certification
  • IT Security Certification

Similar Courses

More Courses by this Instructor