1 00:00:00,470 --> 00:00:07,540 My name is Typhoon, and in this lecture you will learn and understand the lab overview and its technologies. 2 00:00:07,550 --> 00:00:13,280 You will learn how to set up hypervisor and virtual isolated networks. 3 00:00:13,280 --> 00:00:16,630 You will also set up the and work with Kali Linux. 4 00:00:16,640 --> 00:00:22,640 You will also learn how to install Metasploitable two and Metasploitable three. 5 00:00:22,670 --> 00:00:27,710 The first is Target as a target and this vegetable as a vagrant. 6 00:00:27,710 --> 00:00:33,170 So you will also learn the vulnerable web application systems. 7 00:00:33,170 --> 00:00:34,790 So let's get started. 8 00:00:50,920 --> 00:00:54,250 As a feature ethical hacker or penetration tester. 9 00:00:54,250 --> 00:01:00,730 It's a quite important when testing exploits payloads or practicing your hacking skills that you do 10 00:01:00,730 --> 00:01:08,770 not disrupt or cause any sort of harm or damage to another person's system or network infrastructure 11 00:01:08,770 --> 00:01:11,620 such as that of your organization. 12 00:01:13,740 --> 00:01:22,110 While there are many tutorials, videos and training programs, you can read, watch and to gain knowledge. 13 00:01:22,110 --> 00:01:29,820 Working in the field of penetration testing means focuses on continuously enhancing your skills. 14 00:01:29,850 --> 00:01:36,420 Many people can speak about hacking and explain the methodology quite clearly, but don't know how to 15 00:01:36,420 --> 00:01:37,550 perform an attack. 16 00:01:37,560 --> 00:01:44,370 So when learning about penetration testing, it's very important to understand the theory and how to 17 00:01:44,370 --> 00:01:48,960 use your skills to apply them to a real world cyber attack. 18 00:01:51,320 --> 00:01:57,740 In the section of our course, you will learn how to design and create your penetration testing lab 19 00:01:57,740 --> 00:02:01,100 environment and on your existing computer. 20 00:02:01,100 --> 00:02:08,210 Using virtualization technologies, you will learn how to create a virtual isolated network to ensure 21 00:02:08,210 --> 00:02:13,790 you do not accidentally attack systems that you do not own. 22 00:02:13,790 --> 00:02:21,920 So then you will learn how to set up Kali Linux as an attacker system and vulnerable clients and servers 23 00:02:21,920 --> 00:02:23,420 as your targets. 24 00:02:23,420 --> 00:02:32,360 So practicing your hacking skills on systems and networks that you do not own is an intrusive and illegal 25 00:02:32,390 --> 00:02:37,010 because it can cause harm and damage to those systems.