Course Overview
Penetration Testing with Kali Linux (PWK) is an online pentesting course designed for security professionals and network administrators who want to take a serious and meaningful step into the world of professional penetration testing. This best-in-class training course introduces students to the latest ethical hacking tools and techniques, including remote, virtual penetration testing labs for practicing the course materials. PWK simulates a full penetration test from start to finish by immersing the student into a target-rich and vulnerable network environment. Students who pass the exam earn the industry-leading OSCP certification.
Who should attend
- Infosec professionals transitioning into penetration testing
- Pentesters seeking one of the best pentesting certifications
- Those interested in pursuing a penetration tester career path
- Security professionals
- Network administrators
- Other technology professionals
Prerequisites
All students are required to have:
- Solid understanding of TCP/IP networking
- Reasonable Windows and Linux administration experience
- Familiarity with basic Bash and/ or Python scripting
Course Objectives
- Using information gathering techniques to identify and enumerate targets running various operating systems
- Writing basic scripts and tools to aid in the penetration testing process
- Analyzing, correcting, modifying, cross-compiling, and porting public exploit code
- Conducting remote, local privilege escalation, and client-side attacks
- Identifying and exploiting XSS, SQL injection, and file inclusion vulnerabilities in web applications
- Leveraging tunneling techniques to pivot between networks
- Creative problem solving and lateral thinking skills
Outline: Penetration Testing with Kali Linux (PTKL)
- Penetration Testing: What You Should Know
- Getting Comfortable with Kali Linux
- Command Line Fun
- Practical Tools
- Bash Scripting – NEW in 2020
- Passive Information Gathering
- Active Information Gathering
- Vulnerability Scanning
- Web Application Attacks
- Buffer Overflow Intro
- Windows Buffer Overflows
- Linux Buffer Overflow
- Client Side Attacks
- Using Public Exploits
- Fixing Exploits
- File Transfers
- Bypassing Antivirus Software
- Privilege Escalation
- Password Attacks
- Port Redirection and Tunneling
- Metasploit
- Active Directory attacks (Domains)
- PowerShell Empire
- Assembling the Pieces: Penetration Test Breakdown