• We just launched and are currently in beta. Join us as we build and grow the community.

Pluralsight – Exploitation with Kali Linux

dedigalihwisnumurti

High-Performance Computing Engineer
Divine
D Rep
0
0
0
Rep
0
D Vouches
0
0
0
Vouches
0
Posts
115
Likes
103
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 300 XP
Exploitation with Kali Linux course. Kali Linux provides a powerful set of tools for performing security assessments and penetration tests. This course will teach you how to use some of these tools to exploit vulnerable systems, and ultimately to perform post-exploitation actions.
Kali Linux provides a set of tools to help with security assessment and penetration testing. This course will teach you how to use some of these tools to exploit the systems you find and get you to the point where you can perform post-exploitation tasks. There are many security tools to help with penetration testing, and understanding how to use them is essential to performing effective testing. In this course, Exploitation with Kali Linux, you’ll learn how to exploit the vulnerabilities you find. First, you will learn how to access systems using CrackMapExec. Next, you’ll discover how to create and use payloads to basically exploit a computer. Finally, you’ll learn how to use Metasploit on your own to exploit remote systems and prepare for post-exploitation.
 

428,602

311,185

311,194

Top