Kali linux complete training program from scratch

Empiricalten.blogspot.com

Introduction Video:


What is Ethical hacking and Penetration testing:

Installation and Configuration:

Kali Linux:

Operating systems Overview:

Concepts on Operating systems:
Installing Operating Systems:

 Installing vmware tools:
Configuring Kali Linux:

Installing Kali Linux on MacBook:


Footprinting and Reconnaisance:


What is Footprinting:

Footprinting Objectives:

Introduction to Google Hacking:

Nuts and Bolts of Google Hacking:
Google Hacking Processes:
Who is lookup:
DNS footprinting Overview:
DNS footprinting Functions and Process:
Determining Operation System: 
Introduction to Phishing Attacks:
Phishing Attacks Details:
Connecting information database;
Introduction to Nmap and ZenMap:
Nmap:
ZenMap:

Comments