This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Start Ethical Hacking with Parrot Security OS (Alt. to Kali)
Section 1: Introduction and Planning
Introduction and Lab Planning (7:53)
Environment Preparation (27:49)
Section 2: Reconnaissance, Enumeration and Exploitation
Service Scanning with NMAP (10:31)
Reconnaissance (12:13)
Vulnerability Scanning and Exploitation - Part 1 (19:42)
Vulnerability Scanning and Exploitation - Part 2 (23:18)
Section 3: Post-Exploitation and Red Teaming
Post-Exploitation and Red Teaming using Empire3 and Cobalt Strike (17:43)
Where to go from here?
Introduction and Lab Planning
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock