- Joined
- Aug 27, 2018
- Messages
- 38,227
- Reaction score
- 565,152
- Thread Author Вы автор данного материала? |
- #1
What you'll learn:
- Setup an Amazon Free Tier Account
- Create Amazon AWS EC2 Instances
- Setup Guacamole Tool to access and run cloud lab
- Run Pentests on Amazon AWS Infrastructure
- Create Kali Linux on Amazon AWS
- Run basic commands with nmap and metasploit
- Exploit a remote Windows Server with a vulnerability
- Use Kali Linux on Browser with RDP connection
- Basic IT Skills (Windows and Linux OS)
- Internet Access (Preferably faster than 5 Mbps)
- Some Linux Command Line Skills is a plus
- A valid credit card to create an account on Amazon AWS (It won’t cost you a thing as we will use free tier)
Here is why:
- Instead of using your own host device, you will learn how to boot & run Kali Linux entirely on the Cloud.
- You can use any browser to access your Kali Linux.
- You won’t have to spend a dime up to 1 year as you will use Amazon AWS Free Tier account for the entire training, provided that you take good care of the running instances to stay under the free limits. I will show you how you can do that.
- You can access any Linux or Windows machine, directly within your browser. You can continue working in any PC and don’t lose the sessions.
- Also You can save the entire screen like a movie so that you can show it as a proof of actions. You can later watch these screencasts to improve your skills.
- You will practice nmap, metasploit, included in the course! Even if you are a complete beginner in cyber security and ethical hacking, or you want to refresh your skills, you will enjoy the course.
The practical skills you will learn after you complete the course:
- Current limitations of an ethical hacking lab
- Benefits of running your VMs in the cloud
- How to create an Amazon Free Tier account
- How to run Kali Linux as an Amazon EC2 instance
- EC2 dashboard management
- Alternative terminal operations: A handy chrome extension for SSH sessions
- Installing xRDP to Kali Linux. This is also useful if you intend to use GUI with any Linux machine
- LXDE and XFCE session types
- Running a Windows Server as an EC2 instance, which you can use both as a victim or an attacker machine.
- Install Guacamole tool to access & operate any server using your Browser
- Nmap basics to which helps you to start scanning in no time.
- Metasploit commands to send exploits to vulnerable machines.
- Exploting a vulnerable application on Windows Server/
Who this course is for:
- Anyone wishes to run virtual machines on Amazon AWS
- Anyone wants to conduct pentesting and ethical hacking tasks on cloud
- This Penetration Testing course is for newbies who has none or limited experience on ethical hacking
DOWNLOAD: