Kali Linux for Advanced Penetration Testing Training

Advance Penetration Testing with Kali 20 Certification Training Course Overview

Advance penetration testing with Kali Linux is the technology which is more advanced to perform Penetration Testing and Security Auditing Linux distribution. This training will be very helpful for the participants, who are very interested in learning the penetration testing and IT security techniques which comes under the cyber security.  The participants will gain experience on efficient Exploit Writing, Advance Sniffing, Web Penetration Testing, Document Management and Reporting, Social Engineering Toolkit and a lot more about the techniques of Penetration Testing with Kali Linux. This training will insights the participants in installing and configuring the Kali Linux, and develop their understanding of the penetration testing standards as well.

Audience

  • IT professionals who are willing to learn about penetration testing and IT security technique.
  • Other IT professionals who are willing to expand their current knowledge
Test your current knowledge Qubits42

Kali Linux for Advanced Penetration Testing Training (Duration : 56 Hours) Download Course Contents

Live Virtual Classroom
Group Training 2200
27 Sep - 03 Oct 09:00 AM - 05:00 PM CST
(8 Hours/Day)

04 - 10 Oct 09:00 AM - 05:00 PM CST
(8 Hours/Day)

01 - 07 Nov 09:00 AM - 05:00 PM CST
(8 Hours/Day)

1-on-1 Training (GTR) 2550
4 Hours
8 Hours
Week Days
Weekend

Start Time : At any time

12 AM
12 PM

GTR=Guaranteed to Run
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Special Solutions for Corporate Clients! Click here
Hire Our Trainers! Click here

Course Modules

Module 1: Introduction to kali Linux
  • What is new in kali linux
  • Installing kali linux
  • Configure Network Connection
  • Using kali Linux
  • Update kali Linux
Module 2: Penetration Testing Standard
  • Open Web Application Security Project (OWASP)
  • Licensee Penetration Testing (LPT)
Module 3: Penetration Testing Classification
  • White Box and Black Box
  • Penetration Testing vs Vulnerability Assessment
Module 4: Advance Penetration Methodology
  • Target Framework and Scope
  • Gathering client requirements
  • Test plan checklist
  • Profiling test boundaries
  • Advance penetration testing with Kali Linux
Module 5: Information Discovery
  • Google hacking
  • DNS Information Gathering
  • Who is Information Gathering
  • Route and Network information Gathering
  • All-in-one information gathering
Module 6: Scanning Target
  • Advance Network Scanning
  • Port Scanning
  • Stealth Port scanning techniques
  • Udp port scanning
  • Packet crafting using Hping
  • Nmap Scanning and Plug-ins
  • Active Banners and System OS Enumeration
  • Passive Banners and System OS Enumeration
Module 8: Enumerating Target
  • Enumerating users, groups and shares
  • Enumerating DNS resource records
  • Enumerating Network devices
Module 9: Target Exploitation
  • Setting up metaslpoit
  • Exploitation with Metasploit
  • Working with Meterpreter Session
  • VNC Exploitation
  • Stealing password Hash
  • Adding custom Modules to Metasploit
Module 10: Exploit Writing
  • Using Immunity Debugger
  • Writing Exploit for real world applications
Module 11: Privileges Escalation
  • Breaking Password hashes
  • Cracking telnet and ssh password
  • Cracking FTP password
  • Using metasploit post exploitation modules
Module 12: Maintaining Access
  • Protocol tunneling
  • Proxy
  • Installing persistent Backdoor
Module 13: Advance Sniffing
  • ARP Poisoning
  • DHCP Starvation
  • Mac flooding
  • DNS Poisoning: redirecting user to fake website
  • Sniffing credentials from secured websites
Module 14: DOS Attack
  • Syn Attack
  • Application request Flood Attack
  • Service request Flood
  • Permanent denial of service attack
Module 15: Web Penetration Testing
  • Introduction to Web Application Vulnerabilities
  • Web Application Assessment and Exploitation with automation Tools
  • Hacking database using SQL injection
  • Hijacking web sessions
Module 16: Wireless Penetration Testing
  • Introduction to Wireless Security
  • Cracking Wireless Encryptions (WEP,WPA,WPA2)
  • Configuring Fake Access Point
  • Halting wireless network through Dos attack
  • Restricting wireless access through wireless jammer
Module 17: Exploits and Client Side Attack
  • Exploiting browser vulnerability
  • Introduction to Buffer overflow
  • Introduction to fuzzing
  • Fast-Track Hacking
Module 18: Social Engineering Toolkit
  • Stealing passwords through phishing
  • Generating backdoors
  • Java Applet attack
Module 19: Firewall Testing
  • Introduction to Firewall
  • Testing Firewall
  • Testing Firewall Rules
  • Testing Ports
Module 20: Document Management and Reporting
  • Documentation and results verification
  • Dradis Framework
  • Magic Tree and Maltego
Module 21: Data Collection, Evidence Management and Reporting
  • Type of Report
  • Presentation Report
  • Post Testing Procedure
Download Course Contents

Request More Information

Course Prerequisites

·         Basic understanding of Linux/Unix and common networking concepts.

Upon completion of this course, you will be able to accomplish:
 

·         About Kali Linux

·         Vulnerability Assessment Tools for System

·         Penetration Testing Classification

·         The Methodology of Advance Penetration

·         Evidence Management, Data Collection, and Reporting

·         Exploits and Client Side Attack

·         DOS Attack

·         Firewall Testing

·         Knowledge about Maintaining Access

·         More about Information Discovery

·         Privileges Escalation

           

FAQ's


No, the published fee includes all applicable taxes.