Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Practical Linux for Pentesting & Bug Bounties
Training Overview
Description of Training
Video Overview (3:01)
Section 1: Introduction
1. Introduction (3:01)
Section 2: Introduction to Linux
2. Tour to Penetration Testing OS (2:27)
Section 3: Lab Setup
3. Installation of Virtual Box (4:54)
4. Installation of VMware (3:48)
5. Installation of Linux ISO on VMWare (6:03)
6. Installation of Linux ISO on VirtualBox (4:16)
7. Installation of Linux OVA on VMWare (3:33)
8. Installation of Linux OVA on VirtualBox (2:28)
Section 4: Boot Process
9. Windows boot process (2:46)
10. Linux boot Process (9:39)
Section 5: Password Management
11. Breaking root password (5:49)
12. Setting password for GRUB (8:07)
Section 6: Package Managers
13. What are Package Managers (4:54)
14. yum (7:09)
15. brew (4:27)
16. dpkg (4:27)
17. rpm (4:46)
18. chocolaty (3:38)
19. apt (2:53)
20. Searching for Package (2:12)
21. Installing and Removing Package (2:33)
22. Updating Package (2:21)
23. Upgrading Package (1:16)
24. Adding Repositories (8:14)
25. GUI Package Manager - Synaptic (3:58)
26. Installing with git (2:52)
Section 7: Linux System Information
27. Linux System Information Commands (5:35)
Section 8: Linux Hardware Information
28. Linux Hardware Information Commands (5:55)
Section 9: Performance Monitoring
29. Performance Monitoring Commands (3:27)
30. Performance Monitoring Commands - 2 (3:43)
Section 10: Userinfo and Management
31. Userinfo and Management Commands (5:49)
Section 11: File, Directory and Deletion
32. File, Directory and Deletion Commands (11:23)
Section 12: Directory Management
33. Directory Management Commands (4:05)
Section 13: Rename,Move and Case Sensitive
34. Rename,Move and Case Sensitive Commands (4:18)
Section 14: Symbolic Links
35. Symbolic Links Commands (2:02)
Section 15: File Reading
36. File Reading Commands (5:13)
Section 16: Process and Kill
37. Process and Kill Commands (3:21)
38. Process and Kill Commands - 2 (2:22)
Section 17: Background and Foreground
39. Background and Foreground Commands (2:25)
Section 18: Linux Permissions and Umask
40. Linux Permissions Fundamentals (9:03)
41. Adding Permissions (5:35)
42. Removing Permissions (2:46)
43. Execution Permissions (4:24)
44. Linux Octal Permissions (2:52)
45. chown (5:51)
46. chgroup (2:29)
Section 19: Linux Network Management
47. Linux Network Management - 1 (3:26)
48. Linux Network Management - 2 (2:06)
49. Linux Network Management - 3 (5:08)
50. Linux Network Management - 4 (3:37)
51. Linux Network Management - 5 (2:38)
52. Linux Network Management - 6 (5:00)
53. iwconfig (5:41)
54. Spoofing your MAC Address (4:07)
Section 20: Linux Archive Management
55. Linux Archive Management Commands (4:56)
Section 21: Linux Search and Patterns
56. Linux Search and Pattern Commands (5:24)
Section 22: Linux SSH Management
57. Linux SSH Management - 1 (6:40)
58. Linux SSH Management Live - 2 (2:56)
Section 23: Linux SAMBA Management
59. Linux SAMBA Management - 1 (8:18)
60. Linux SAMBA Management - 2 (4:53)
Section 24: Linux File System
61. Linux File System Architecture (1:39)
62. root - 1 (1:44)
63. root - 2 (2:12)
64. etc (2:36)
65. home (2:52)
Section 25: Snapshot
66. Snapshot of Linux Booting Proccess
Section 26: Writing Bash Script for Linux Permissions
67. Quick and Faster way of Assigning permissions
Section 27: Learning Linux System Command
68. Linux System Command
Section 28: Snapshot of Linux System Information
69. Linux System Information
Section 29: Learning Linux Performance Monitoring
70. Understanding Top Performance Monitoring Commands
71. Introduction to Linux Performance Commands
Audio Version of the Training
Audio Download
56. Linux Search and Pattern Commands
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock