The Complete Ethical Hacking Course 2.0: Python & Kali Linux

The Complete Ethical Hacking Course 2.0: Python & Kali Linux
English | Size: 7.20 GB
Category: Video Training


Learn network penetration testing, ethical hacking using the amazing programming language, Python along with Kali Linux!
[Read more…]

ITPro TV – Kali Linux

ITPro TV – Kali Linux
English | Size: 10 GB
Category: Video Training


Kali Linux is an advanced, versatile penetration testing platform and has dozens and dozens of tools complied into it, making it a very powerful, yet highly customizable platform. These episodes will teach you how to install Kali Linux, and how to use Kali Linux to test the security of a network. You will learn how to effectively perform a penetration test using the various tools found in Kali Linux. [Read more…]

Learning Path – Kali Linux

Learning Path – Kali Linux
English | Size: 1.91 GB
Category: Linux


Learning Path: Kali Linux
Publisher: Packt Publishing
Release Date: September 2016

An introduction to white hat penetration testing

The phrase ‘the best offense is a good defense’ couldn’t be more applicable to the realm of enterprise penetration testing and security. This Learning Path specifically focuses on the broader Kali Linux toolkit, and will provide you with the expertise and exposure you need to fully test and explore your local networks with confidence. Please test responsibly.
[Read more…]

CBT Nuggets BackTrack And Kali Linux

CBT Nuggets BackTrack And Kali Linux
English | Size: 2.46 GB (2,643,453,240 bytes )
Category: CBTs


BackTrack (BT) and Kali Linux are the “Swiss Army Knife” of penetration testing, information gathering and vulnerability assessment tools (all conveniently packaged in a free Linux distribution). Learn all about them in this series with trainer Keith Barker!

CBT NUGGETS: BACKTRACK AND KALI LINUX
Release Name: Clean.Coders.18.Component.Case.Study-PRODEV
Release Date: 2013-04-21
Release Size: 2500MB
Release URL: www.cbtnuggets.com/it-training-videos/series/cbtn_backtrack_sec [Read more…]

ITPro TV – Kali Linux Penetration Test

ITPro TV – Kali Linux Penetration Test
English | Size: 29.64 GB (31,827,263,913 bytes )
Category: CBTs


Kali Linux is an advanced, versatile penetration testing platform. These episodes will teach you how to install Kali Linux, and how to use Kali Linux to test the security of a network. You will learn how to effectively perform a penetration test using the various tools found in Kali Linux.
[Read more…]

Udemy – Ethical Hacking With Kali Linux – Step By Step Installation

Udemy – Ethical Hacking With Kali Linux – Step By Step Installation

English | Size: 198.22 MB (207,849,604 Bytes)
Category: CBTs


Ethical Hacking With Kali Linux – Step By Step Installation

MP4 | Video: 1280×720 | 59 kbps | 44 KHz | Duration: 2 Hours | 203 MB
Genre: eLearning | Language: English
Learn the Basics To Advanced Methods To Use Kali Linux For Security and Port Scanning Using NMAP

You are about to be introduced to one of the most powerful penetration testing platforms in the world. Kali Linux [Read more…]

Metasploit Extreme on Kali Linux

Metasploit Extreme on Kali Linux

English | Size: 498.72 MB (522,948,417 Bytes)
Category: CBTs


Metaspoit Framework is a open source penetration tool used for developing and executing exploit code against a remote target machine it, Metasploit frame work has the world’s largest database of public, tested exploits. In simple words, Metasploit can be used to test the Vulnerability of computer systems in order to protect them and on the other hand it can also be used to break into remote systems.

Its a powerful tool used for penetration testing.

In clear and short words, If you interested in words like security, Hacking, exploits etc, then this is a must series for you.

What are the requirements?

Headphones
Min of 2 GB RAM

What am I going to get from this course?

Over 55 lectures and 6 hours of content!
Master the re-engineered Metasploit framework in Kali Linux

What is the target audience?

No prior knowledge is required, so all are invited to join in

Buy Long-term Premium Accounts To Support Me & Max Speed

DOWNLOAD:


rapidgator.net/file/ece04f2aa7a1054ae184c94932f9cc2c/Metasploit_on_Kali_Linux.rar.html


nitroflare.com/view/44D902C74A382F8/Metasploit_on_Kali_Linux.rar

If any links die or problem unrar, send request to goo.gl/aUHSZc

Kali Linux – Backtrack Evolved Assuring Security by Penetration Testing [40 MP4, 2 PDF]

Kali Linux – Backtrack Evolved: Assuring Security by Penetration Testing [40 MP4, 2 PDF]
English | Size: 575.98 MB (603,963,917 bytes )
Category: Tutorial


Kali Linux – Backtrack Evolved: Is a Penetration Testers Guide is a great choice for
anybody interested in information security, penetration testing or ethical hacking.
Kali Linux is the latest Linux distribution from Offensive Security, custom-built for
the distinct purposes of performing network security audits and forensic
investigations.
[Read more…]

Pluralsight – Digital Forensics Tools in Kali Linux Imaging and Hashing

Pluralsight – Digital Forensics Tools in Kali Linux: Imaging and Hashing

English | Size: 917.83 MB (962,419,478 Bytes)
Category: Tutorial


Kali Linux (formerly BackTrack) is best known as the premier Linux distribution system for application and network penetration testers. Kali also includes many digital forensics tools that are useful for formal forensics investigations, solving problems in Information Technology, and learning about digital forensics. Professional digital forensic examiners, IT people, and students new to digital forensics will all find the information and demonstrations of the digital imaging and cryptographic hashing tools in this course very useful. [Read more…]

Packt – Kali Linux Web App Testing

Packt – Kali Linux Web App Testing

English | Size: 484.85 MB (508,403,707 Bytes)
Category: Tutorial


Grasp how attacks such as SQL and XSS injections function and ward them off
Guard your applications against threats such as File inclusion, Bruteforcing, and Remote command executions by understanding how they work
Scan your application for vulnerabilities with dynamic tools such as w3af and OWASP Zap to resolve them on time
[Read more…]