All language subtitles for 004 Lab Overview_en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian Download
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,540 --> 00:00:04,500 As I mentioned, this course is going to be highly practical. 2 00:00:04,830 --> 00:00:11,820 Therefore, you will need a lab, a place where you can practice and experiment with the things that 3 00:00:11,820 --> 00:00:14,130 you're going to learn in the course. 4 00:00:14,910 --> 00:00:20,220 Not only that, but having a lab is essential for hackers or pen testers. 5 00:00:20,220 --> 00:00:26,520 Because let's say you discovered a new attack or you want to experiment with a new attack, or you learn 6 00:00:26,520 --> 00:00:28,970 something new online and you want to test it. 7 00:00:28,980 --> 00:00:35,790 Then the perfect place for you to test this and practice hacking is a hacking or a testing lab. 8 00:00:36,750 --> 00:00:42,720 Now to create a lab, you just need a number of computers with different operating systems, and you 9 00:00:42,720 --> 00:00:44,430 will need a number of networks. 10 00:00:44,430 --> 00:00:50,070 If you are testing network attacks and if you are testing website attacks, then you will need to install 11 00:00:50,070 --> 00:00:52,110 websites on these computers. 12 00:00:52,560 --> 00:01:00,990 Or you can do all of this inside your computer, inside one machine, and install everything else as 13 00:01:00,990 --> 00:01:02,430 virtual machines. 14 00:01:02,610 --> 00:01:04,739 And this is what we're going to do. 15 00:01:04,920 --> 00:01:07,680 So let's say you have your computer right here. 16 00:01:07,680 --> 00:01:13,980 This is your main computer that you use every day to check your emails or even to watch this course. 17 00:01:14,670 --> 00:01:18,570 This computer might be running Windows, OSX or Linux. 18 00:01:18,570 --> 00:01:19,740 It doesn't really matter. 19 00:01:19,740 --> 00:01:21,660 It can run any operating system. 20 00:01:21,660 --> 00:01:30,660 You can keep all the programs that you love and like and install a virtualization software such as VirtualBox 21 00:01:30,660 --> 00:01:31,890 or VMware. 22 00:01:32,010 --> 00:01:40,830 A virtualization software allow us to create a number of virtual computers inside your main computer 23 00:01:40,830 --> 00:01:49,680 so we can have three or four or five or ten computers all installed inside your main operating system. 24 00:01:49,680 --> 00:01:51,570 Inside your main computer. 25 00:01:52,680 --> 00:01:57,120 The really cool thing about this is you will not need a number of computers. 26 00:01:57,120 --> 00:02:00,990 You can do everything inside a single computer. 27 00:02:01,940 --> 00:02:05,700 So what we're going to do is we're going to have a hacking machine. 28 00:02:05,720 --> 00:02:11,280 This is going to be the machine that we will use in order to hack into other machines. 29 00:02:11,300 --> 00:02:16,520 We're going to install Linux on it and we'll talk about what that is later on. 30 00:02:17,300 --> 00:02:20,410 And we're going to have to target machines. 31 00:02:20,420 --> 00:02:25,820 These are machines that we're going to try to hack into and practice hacking against. 32 00:02:26,360 --> 00:02:32,060 One of them is going to be running windows and the other one is going to be running an operating system 33 00:02:32,060 --> 00:02:33,530 called Metasploit Table. 34 00:02:33,530 --> 00:02:36,170 And we will talk about that once we get to it. 35 00:02:37,470 --> 00:02:44,880 Now it is very important to understand that you will not lose any functionality when you install an 36 00:02:44,880 --> 00:02:52,470 operating system as a virtual machine, you can use that machine exactly as if it's a real physical 37 00:02:52,470 --> 00:02:53,250 machine. 38 00:02:54,090 --> 00:02:59,640 So the really cool thing about using virtual machines, first of all, you're not going to lose any 39 00:02:59,640 --> 00:03:00,840 functionality. 40 00:03:00,900 --> 00:03:04,570 Second, all the machines are going to be isolated. 41 00:03:04,590 --> 00:03:10,350 So as we go through the course, we're going to be trying to hack into these machines and we might actually 42 00:03:10,350 --> 00:03:13,050 break one of them, but that's fine. 43 00:03:13,050 --> 00:03:15,300 It will not affect your host machine. 44 00:03:15,300 --> 00:03:22,530 You will be able to easily fix this and go back to a snapshot of when the machine was working without 45 00:03:22,530 --> 00:03:24,900 affecting your main computer. 46 00:03:25,800 --> 00:03:31,050 The other cool thing is that you'll be able to have a number of different versions of each of these 47 00:03:31,050 --> 00:03:37,860 machines, and you'll be able to change the configuration easily, change the network settings, or 48 00:03:37,860 --> 00:03:42,420 switch between different states of these machines and so on. 49 00:03:43,080 --> 00:03:51,240 So by using virtualization, you will not lose any functionality, but you will gain so many cool features. 50 00:03:51,990 --> 00:03:55,830 And the main thing to keep in mind is your host machine. 51 00:03:55,830 --> 00:03:58,620 Your main computer will never be affected. 52 00:03:58,620 --> 00:04:00,480 It's completely isolated. 53 00:04:00,630 --> 00:04:08,040 And if we break any of these machines, nothing will happen to your precious computer that you use every 54 00:04:08,040 --> 00:04:08,610 day. 55 00:04:08,790 --> 00:04:14,220 And this way you can always use your host machine for daily use, for checking emails, watching the 56 00:04:14,220 --> 00:04:20,850 videos, doing whatever you do normally, and then use your virtual machines for hacking and practicing 57 00:04:20,850 --> 00:04:21,750 the attacks. 58 00:04:22,500 --> 00:04:25,560 And this is what we're going to be doing in this course. 59 00:04:25,560 --> 00:04:31,320 So right here I have a Windows computer that does not contain any hacking tools. 60 00:04:31,320 --> 00:04:38,790 So I can't really use it for hacking, but I have a virtualization software called VMware installed 61 00:04:38,790 --> 00:04:48,060 on it, and this software allows me to run multiple operating systems as virtual machines within this 62 00:04:48,060 --> 00:04:49,560 host computer. 63 00:04:49,920 --> 00:04:57,030 So I can use the host computer for my data use and then use the virtual machines for whatever use I 64 00:04:57,030 --> 00:04:59,220 want for testing or for hacking. 65 00:04:59,670 --> 00:05:04,980 So if I zoom in here on the left, you can see that I have Linux installed. 66 00:05:04,980 --> 00:05:08,070 This is an operating system that we will use for hacking. 67 00:05:08,070 --> 00:05:10,620 You can see I have another Windows computer. 68 00:05:10,620 --> 00:05:14,880 You can see that I have Linux, all of it installed as virtual machines. 69 00:05:14,880 --> 00:05:20,850 And then we're going to be using these as we go through the course for hacking or for testing without 70 00:05:20,850 --> 00:05:25,980 affecting our main host operating system, this Windows Computer. 71 00:05:26,910 --> 00:05:29,400 Now, don't worry about any of this. 72 00:05:29,400 --> 00:05:36,330 In the next lectures, I will show you in details how to install this virtualization software, VMware 73 00:05:36,330 --> 00:05:43,230 on all of the major operating systems on Windows, Linux or Apple Mac OS. 74 00:05:43,890 --> 00:05:50,790 As we go through the course, I will also show you in details how to install these operating systems 75 00:05:50,790 --> 00:05:53,790 as virtual machines within VMware. 7800

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.