Learn Ethical Hacking With Kali, Nmap and Metasploit!

Emin CALISKAN, Frontier Education Labs and Technologies on Cyber

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
46 Videos (2h 48m)
    • Practical Penetration Testing with Kali, Nmap and Metasploit Course

      2:04
    • Welcome!

      2:04
    • Introduction Lecture

      2:03
    • So, what is pentesting?

      2:47
    • Types of Pentests and Pentesting Process

      3:08
    • Lets talk about Kali

      1:51
    • Wrap up: Introduction to pentesting

      0:52
    • Why do we need a lab environment?

      1:14
    • Downloading Kali, Vmware Workstation, Metasploitable, Windows 7

      5:09
    • Installing VMware Player

      2:11
    • Installing Kali

      7:30
    • Installing Metasploitable

      3:02
    • Installing Windows 7

      3:45
    • Wrap Up

      0:34
    • Section4Lecture1

      8:56
    • Section4Lecture2

      2:41
    • Section4Lecture3

      2:52
    • Section4Lecture4

      5:32
    • Section4Lecture5

      1:05
    • Section5Lecture1

      0:44
    • Section5Lecture2

      5:02
    • Section5Lecture3

      8:58
    • Section5Lecture4

      6:12
    • Section5Lecture5

      0:36
    • Section6Lecture1

      8:29
    • Section6Lecture2

      2:36
    • Section6Lecture3

      7:43
    • Section6Lecture4

      3:16
    • Section6Lecture5

      3:02
    • Section6Lecture6

      5:56
    • Section6Lecture7

      0:51
    • Section7Lecture1

      1:42
    • Section7Lecture2

      5:15
    • Section7Lecture3

      5:37
    • Section7Lecture4

      5:24
    • Section7Lecture5

      6:19
    • Section7Lecture6

      5:52
    • Section7Lecture8

      0:50
    • Section8Lecture1

      0:47
    • Section8Lecture2

      5:44
    • Section8Lecture3

      4:06
    • Section8Lecture4

      6:48
    • Section8Lecture5

      1:04
    • Section9Lecture1

      1:08
    • Section9Lecture2

      0:22
    • Section7Lecture7

      4:00