Linux for Pentesting & Bug Bounties
Practical Linux course for Pentesting & Bug Bounties
Below checkout is only for Indian Students.
Students outside India can pay via Paypal from above Buy $2 Button or at checkout page.
Pay with UPI, Credit & Debit Card
NOTE : You will not see the course onto the dashboard instantly. Enrolment process will take up to 2 hrs from the purchase time.
If you are not able to access after 24 hrs of purchase please write us at [email protected] attaching your transaction id or reach out to us on WhatsApp for instant support +91-8160206309/ +91 9106147779
Introduction
Tour to Penetration Testing OS
Installation of Virtual Box
Installation of VMware
Installation of Linux ISO on VMWare
Installation of Linux ISO on VirtualBox
Installation of Linux OVA on VMWare
Installation of Linux OVA on VirtualBox
Windows boot process
Linux boot Process
Breaking root password
Setting password for GRUB
What are Package Managers
yum
brew
dpkg
rpm
chocolaty
apt
Searching for Package
Installing and Removing Package
Updating Package
Upgrading Package
Adding Repositories
GUI Package Manager - Synaptic
Installing with git
Linux System Information Commands
Linux Hardware Information Commands
Performance Monitoring Commands
Performance Monitoring Commands - 2
Userinfo and Management Commands
File, Directory and Deletion Commands
Directory Management Commands
Rename, Move and Case Sensitive Commands
Symbolic Links Commands
File Reading Commands
Process and Kill Commands
Process and Kill Commands - 2
Background and Foreground Commands
Linux Permissions Fundamentals
Adding Permissions
Removing Permissions
Execution Permissions
Linux Octal Permissions
chown
chgroup
Linux Network Management - 1
Linux Network Management - 2
Linux Network Management - 3
Linux Network Management - 4
Linux Network Management - 5
Linux Network Management - 6
iwconfig
Spoofing your MAC Address
Linux Archive Management Commands
Linux Search and Pattern Commands
Linux SSH Management - 1
Linux SSH Management Live - 2
Linux SAMBA Management - 1
Linux SAMBA Management - 2
Linux File System Architecture
root - 1
root - 2
etc
home
Snapshot of Linux Boot Process
Snapshot of File permission and bash script for File Permission
Snapshot of Linux System Command.
Snapshot of Linux System Information
Understanding Linux Performance Monitoring Commands
Rohit Gautam
Shifa Cyclewala
Frequently asked questions
You will have access for 365 days.
Yes, we have curated the course content with live simulations of practicals which is 100% inclined practicals with industry standards.
Yes, most of our students who have enrolled the course has been successful and have been acknowledged with many HoF, Bounties, Internships & Jobs. Don't take our words check our Linkedin Handle for student reviews and their acknowledgements - linkedin.com/in/shifa