Skip to navigation
Skip to navigation
Skip to search form
Skip to login form
Skip to footer
Skip to main content
MVP189
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
PAREPOS
JAVABET99
KONTAN88
PEWE128
LAGA88
SKY99IDN
BUANA88
BOXING55
DEWISRI88
DEWISRI88
DEWISRI88
MVP189
slot mania
MVP189
situs tergacor
pg slot wallet
Accessibility options
Accessibility profiles
Visual impairment
Seizure and epileptic
Color vision deficiency
ADHD
Learning
Content adjustments
Readable font
Highlight titles
Highlight links
Stop animations
Text size
+
+ +
+ + +
Line height
+
+ +
+ + +
Text spacing
+
+ +
+ + +
Color adjustments
Dark contrast
Light contrast
High contrast
High saturation
Low saturation
Monochrome
Orientation adjustments
Reading guide
Reading Mask
Big black cursor
Big white cursor
Email: it@huph.edu.vn
Email: it@huph.edu.vn
Các khóa học
Link list
Đổi giao diện
Giao diện cũ
Giao diện mới
Learning AI
Machine Learning cơ bản
en
English
Technology
Security
Udemy - Professional Ethical Hacker with Kali Linux v2025 2025-4
0 students
Last updated
Jul 2025
Enrol now
Overview
Course content
Instructors
About the course
Udemy - Professional Ethical Hacker with Kali Linux v2025 2025-4
Show more...
Course content
Sections:
6
•
Activities:
1
•
Resources:
48
Expand all
Section 1
Introduction
Announcements
1 Introduction
2 Theory to Hacking
3 Essential knowledge to be a Ethical Hacker
Section 2
Installation and customization
1 Installing VirtualBox
2 Installing Kali Linux
3 First Adjustments
4 Using SSH via PowerShell on Windows
5 Docker Installation
Section 3
Information collection
1 Understanding OSINT
2 Service Enumeration with DNSenum
3 Determine network range
4 Using Maltego
5 Using Recon ng
6 Using EyeWitness
7 Getting detailed information from an IP
8 Capturing information with theHarvester
9 Capturing information with RiskIQ
10 Using GooFuzz
11 Using Maigret
Section 4
Vulnerability assessment
1 Installing Nessus
2 Finding Network Vulnerabilities with Nessus
3 Finding Vulnerabilities in Linux with Nessus
4 Finding vulnerabilities in Windows with Nessus
5 Installing and Configuring OpenVAS GVM
6 Finding Vulnerabilities with OpenVAS
7 Using Nikto
Section 5
Crawlers and Spiders
1 Installing BodgeIt and Juice Shop
2 Downloading a page and analyzing it with Wget
3 Downloading the page for offline analysis with HTTrack
4 Using Burp Suite to crawl a website
5 Obtaining and modifying cookies
6 Initial setup of ZAP Zed Attack Proxy
7 First ZAP settings
8 Fuzzer Concept
9 Fuzzing in practice
10 Crawler Spider Test
11 AJAX Spider Test
Section 6
Exploiting vulnerabilities
1 Getting to know Metasploit
2 Performing a vulnerability scan with Metasploit
3 Exploring and gaining access
4 Post invasion exploration
5 Post invasion exploration 2
6 Using XSS and Metasploit to obtain a remote shell
7 Hacking Windows systems
8 Privilege Escalation
9 Installing Metasploitable3
10 Exploring SSH Access
11 Metasploitable Tomcat
Instructors
Enrolment options
Udemy - Professional Ethical Hacker with Kali Linux v2025 2025-4
Course modified date:
6 July 2025
Udemy - Professional Ethical Hacker with Kali Linux v2025 2025-4
Enrolled students:
There are no students enrolled in this course.
Guests cannot access this course. Please log in.
Continue
Enrol now
This course includes
Forums
Resources
Share this course
Scroll to top
×
Close
×
Close