Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Practical Linux for Pentesting & Bug Bounties
Training Overview
Description of Training
Video Overview (3:01)
Section 1: Introduction
1. Introduction (3:01)
Section 2: Introduction to Linux
2. Tour to Penetration Testing OS (2:27)
Section 3: Lab Setup
3. Installation of Virtual Box (4:54)
4. Installation of VMware (3:48)
5. Installation of Linux ISO on VMWare (6:03)
6. Installation of Linux ISO on VirtualBox (4:16)
7. Installation of Linux OVA on VMWare (3:33)
8. Installation of Linux OVA on VirtualBox (2:28)
Section 4: Boot Process
9. Windows boot process (2:46)
10. Linux boot Process (9:39)
Section 5: Password Management
11. Breaking root password (5:49)
12. Setting password for GRUB (8:07)
Section 6: Package Managers
13. What are Package Managers (4:54)
14. yum (7:09)
15. brew (4:27)
16. dpkg (4:27)
17. rpm (4:46)
18. chocolaty (3:38)
19. apt (2:53)
20. Searching for Package (2:12)
21. Installing and Removing Package (2:33)
22. Updating Package (2:21)
23. Upgrading Package (1:16)
24. Adding Repositories (8:14)
25. GUI Package Manager - Synaptic (3:58)
26. Installing with git (2:52)
Section 7: Linux System Information
27. Linux System Information Commands (5:35)
Section 8: Linux Hardware Information
28. Linux Hardware Information Commands (5:55)
Section 9: Performance Monitoring
29. Performance Monitoring Commands (3:27)
30. Performance Monitoring Commands - 2 (3:43)
Section 10: Userinfo and Management
31. Userinfo and Management Commands (5:49)
Section 11: File, Directory and Deletion
32. File, Directory and Deletion Commands (11:23)
Section 12: Directory Management
33. Directory Management Commands (4:05)
Section 13: Rename,Move and Case Sensitive
34. Rename,Move and Case Sensitive Commands (4:18)
Section 14: Symbolic Links
35. Symbolic Links Commands (2:02)
Section 15: File Reading
36. File Reading Commands (5:13)
Section 16: Process and Kill
37. Process and Kill Commands (3:21)
38. Process and Kill Commands - 2 (2:22)
Section 17: Background and Foreground
39. Background and Foreground Commands (2:25)
Section 18: Linux Permissions and Umask
40. Linux Permissions Fundamentals (9:03)
41. Adding Permissions (5:35)
42. Removing Permissions (2:46)
43. Execution Permissions (4:24)
44. Linux Octal Permissions (2:52)
45. chown (5:51)
46. chgroup (2:29)
Section 19: Linux Network Management
47. Linux Network Management - 1 (3:26)
48. Linux Network Management - 2 (2:06)
49. Linux Network Management - 3 (5:08)
50. Linux Network Management - 4 (3:37)
51. Linux Network Management - 5 (2:38)
52. Linux Network Management - 6 (5:00)
53. iwconfig (5:41)
54. Spoofing your MAC Address (4:07)
Section 20: Linux Archive Management
55. Linux Archive Management Commands (4:56)
Section 21: Linux Search and Patterns
56. Linux Search and Pattern Commands (5:24)
Section 22: Linux SSH Management
57. Linux SSH Management - 1 (6:40)
58. Linux SSH Management Live - 2 (2:56)
Section 23: Linux SAMBA Management
59. Linux SAMBA Management - 1 (8:18)
60. Linux SAMBA Management - 2 (4:53)
Section 24: Linux File System
61. Linux File System Architecture (1:39)
62. root - 1 (1:44)
63. root - 2 (2:12)
64. etc (2:36)
65. home (2:52)
Section 25: Snapshot
66. Snapshot of Linux Booting Proccess
Section 26: Writing Bash Script for Linux Permissions
67. Quick and Faster way of Assigning permissions
Section 27: Learning Linux System Command
68. Linux System Command
Section 28: Snapshot of Linux System Information
69. Linux System Information
Section 29: Learning Linux Performance Monitoring
70. Understanding Top Performance Monitoring Commands
71. Introduction to Linux Performance Commands
Audio Version of the Training
Audio Download
62. root - 1
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock