Book Image

Mastering Ethical Hacking [Video]

By : Alexis Ahmed
Book Image

Mastering Ethical Hacking [Video]

By: Alexis Ahmed

Overview of this book

<p><span id="description" class="sugar_field">Security is the foremost concern for all organizations both big and small, and thus companies and people are ready to invest in enhanced security, pentesting, and Ethical Hacking. Security is a major issue that organizations are now facing. Cyber threats are on the increase with the rising growth of technology, thus giving rise to the need for ethical hacking and advanced security. </span></p> <p><span id="description" class="sugar_field">This course takes your Ethical Hacking skills to the next level to help you address various security threats, whether in information, networks, and other security concerns. This course will start by showing you how to install Kali Linux on your system and how to work with it. The course will then show you how to gather information using different methods such as fingerprinting and open ports. </span></p> <p><span id="description" class="sugar_field">The course will then help you check your system's vulnerability using Nessus and OpenVAS. You will then learn to exploit your vulnerability with different parameters to reveal all the gaps in your system. You'll then escalate privileges in your system to improve your design and program, and prevent password attacks using different methods. Finally, you will learn to prevent wireless attacks on your system. </span></p> <p><span id="description" class="sugar_field">By the end of the course, you will be a Master of Ethical Hacking and will have learned to prevent unwanted hackers from hacking into your system.</span></p> <h2><span class="sugar_field">Style and Approach</span></h2> <p><span class="sugar_field"><span id="trade_selling_points_c" class="sugar_field">This course is a seamless blend of text, videos, code examples, and assessments that will help you, master Ethical Hacking efficiently as you progress through the course. The course has a perfect blend of theory and practical knowledge. It is also example-heavy so that it is easier to relate to.</span></span></p>
Table of Contents (7 chapters)
Chapter 6
Password Cracking
Content Locked
Section 4
Password Cracking with Medusa
In this video, we will learn how to crack online log ins with Medusa. - Learn the syntax - Use wordlist and usernames - Learn about Exploitation with Medusa