Penetration Testing with Kali Linux (PTKL)

 

Course Overview

Penetration Testing with Kali Linux (PWK) is an online pentesting course designed for security professionals and network administrators who want to take a serious and meaningful step into the world of professional penetration testing. This best-in-class training course introduces students to the latest ethical hacking tools and techniques, including remote, virtual penetration testing labs for practicing the course materials. PWK simulates a full penetration test from start to finish by immersing the student into a target-rich and vulnerable network environment. Students who pass the exam earn the industry-leading OSCP certification.

Who should attend

  • Infosec professionals transitioning into penetration testing
  • Pentesters seeking one of the best pentesting certifications
  • Those interested in pursuing a penetration tester career path
  • Security professionals
  • Network administrators
  • Other technology professionals

Prerequisites

All students are required to have:

  • Solid understanding of TCP/IP networking
  • Reasonable Windows and Linux administration experience
  • Familiarity with basic Bash and/ or Python scripting

Course Objectives

  • Using information gathering techniques to identify and enumerate targets running various operating systems
  • Writing basic scripts and tools to aid in the penetration testing process
  • Analyzing, correcting, modifying, cross-compiling, and porting public exploit code
  • Conducting remote, local privilege escalation, and client-side attacks
  • Identifying and exploiting XSS, SQL injection, and file inclusion vulnerabilities in web applications
  • Leveraging tunneling techniques to pivot between networks
  • Creative problem solving and lateral thinking skills

Outline: Penetration Testing with Kali Linux (PTKL)

  • Penetration Testing: What You Should Know
  • Getting Comfortable with Kali Linux
  • Command Line Fun
  • Practical Tools
  • Bash Scripting – NEW in 2020
  • Passive Information Gathering
  • Active Information Gathering
  • Vulnerability Scanning
  • Web Application Attacks
  • Buffer Overflow Intro
  • Windows Buffer Overflows
  • Linux Buffer Overflow
  • Client Side Attacks
  • Using Public Exploits
  • Fixing Exploits
  • File Transfers
  • Bypassing Antivirus Software
  • Privilege Escalation
  • Password Attacks
  • Port Redirection and Tunneling
  • Metasploit
  • Active Directory attacks (Domains)
  • PowerShell Empire
  • Assembling the Pieces: Penetration Test Breakdown

Prices & Delivery methods

Online Training

Duration
5 days

Price
  • US $ 6,495

Click on town name or "Online Training" to book Schedule

Guaranteed date:   This green checkmark in the Upcoming Schedule below indicates that this session is Guaranteed to Run.
Instructor-led Online Training:   This is an Instructor-Led Online (ILO) course. These sessions are conducted via WebEx in a VoIP environment and require an Internet Connection and headset with microphone connected to your computer or laptop.
*   This class is delivered by a vendor or third party partner.

United States

Guaranteed to Run Online Training 09:00 Eastern Standard Time (EST) * Enroll
Online Training 18:00 Eastern Daylight Time (EDT) 14 days * Enroll