SETC Training844-434-7382
 Find a Course: 
 
Programming TrainingMicrosoft TrainingMS Office TrainingServer TrainingManagement TrainingNetwork TrainingAbout UsContact Us

LINUX Training


The ambience, food and camaraderie excellent. The arrangements made to compensate for my disability has been much appreciated. THANKS The place felt like home.
Comment from Shared Services

1. Title

  • The Complete Penetration Testing Workshop for IT Professionals: Exploring the Power of Linux Kali (PENCP, 5 days)
    View PDF

2. Course Pre-requisites

  • Sound fundamental knowledge of Linux and some previous security work or equivalent knowledge.

3. Target Audience

  • IT professionals who want to learn how to perform penetration testing in a corporate environment

4. Dates and Pricing


Nov 20 to Nov 24, 2017$3,350.00/person

5. Outline

Module 1: Linux Kali: The Bare Essentials

Topic 1: Setting up Linux Kali

Topic 2: A Note on Lab Configuration

Topic 3: A Quick Intro to the Linux Command Line

Topic 4: Touring the Linux File System

Topic 5: Mastering User Privilege and SELinux

Topic 6: All about File Permissions

Topic 7: Editing Files with VIM

Module 2: Linux Kali: A Few Useful Topics

Topic 1: About Runlevels and Boot

Topic 2: Managing Packages with apt-get

Topic 3: Managing Processes and Services

Topic 4: Setting up and Understanding IP Addresses and Hostnames

Topic 5: Mastering Netcat

Topic 6: Mastering the Firewall

Topic 7: A Quick Tour of TCPDump

Module 3: BASH Scripting and Other Programming

Topic 1: More on VIM Editing

Topic 2: Setting up your Profile

Topic 3: Working with Quotes

Topic 4: Working with Variables

Topic 5: Implementing Conditional Logic

Topic 6: Implementing Repeating Logic

Topic 7: A Few More Advanced Concepts

Topic 8: Writing Python Scripts: A Quick Tour

Topic 9: Introduction to C Compilers

Topic 10: Writing and Compiling C Code

Module 4: Power Tools: The Metasploit Framework

Topic 1: What is the Metasploit Framework?

Topic 2: Starting and Updating Metasploit

Topic 3: Finding Metasploit Modules

Topic 4: Using Metasploit Modules

Topic 5: Setting Module Options

Topic 6: Working with Payloads

Topic 7: Setting a Payload Manually

Topic 8: Working with PostgreSql

Topic 9: Working with msfcli

Topic 10: Using msfvenom

Topic 11: Overview of Auxiliary Modules

Module 5: The Assessment Phase

Topic 1: The Basics of Intelligence Gathering

Topic 2: What does Port Scanning Provide?

Topic 3: The Details of nmap

Topic 4: More on nmap Scanning

Topic 5: Working with the nmap Scripting Engine

Topic 6: Working with Metasploit Scanners

Topic 7: Working with Metasploit Exploit Checking

Topic 8: Setting up ZAP Attack

Topic 9: Web Application Scanning with ZAP Attack

Module 6: Capturing Real Traffic

Topic 1: Overview of Network Capture Tools

Topic 2: Working with TCPDump

Topic 3: Working with Wireshark

Topic 4: ARP and DNS Cache Poisoning

Topic 5: SSL Attacks and SSL Stripping

Module 7: The Art of Exploitation: The Basics

Topic 1: Exploiting the SMB Protocol

Topic 2: Exploiting NFS Shares

Topic 3: Exploitation with WebDAV Default Credentials

Topic 4: Exploiting and Open phpMyAdmin

Topic 5: Downloading Sensitive Files

Topic 6: Exploiting a Buffer Overflow in Third-Party Software

Topic 7: Exploiting Third-Party Web Applications

Topic 8: Exploiting a Compromised Service

Topic 9: Exploiting Remote Desktop

Module 8: The Art of Exploitation: Server Applications

Topic 1: Exploiting SSH

Topic 2: Exploiting Apache

Topic 3: Exploiting IIS Web Server

Topic 4: Exploiting FTP

Topic 5: Exploiting SQL Server

Topic 6: Exploiting Oracle

Topic 7: Exploiting MySQL

Module 9: Password Attacks

Topic 1: Password Management

Topic 2: Online Password Attacks

Topic 3: Offline Password Attacks

Topic 4: Dumping Plaintext Passwords from Memory with Windows Credential Editor

Module 10: Social Engineering

Topic 1: The Social-Engineer Toolkit

Topic 2: Spear-Phishing Attacks

Topic 3: Web Attacks

Topic 4: Mass Email Attacks

Topic 5: Multipronged Attacks

Module 11: Bypassing Antivirus Applications

Topic 1: Trojans

Topic 2: How Antivirus Applications Work

Topic 3: Microsoft Security Essentials

Topic 4: Getting Past an Antivirus Program

Topic 5: Hiding in Plain Sight

Module 12: After the Exploit

Topic 1: Introduction to Meterpreter

Topic 2: Working with Meterpreter Scripts

Topic 3: All about Metasploit Post-Exploitation Modules

Topic 4: Local Privilege Escalation

Topic 5: Local Information Gathering

Topic 6: Lateral Movement

Topic 7: Pivoting

Topic 8: Persistence

Module 13: Web Application Testing

Topic 1: Working with ZAP Attack

Topic 2: SQL Injection

Topic 3: XPath Injection

Topic 4: Local File Inclusion

Topic 5: Remote File Inclusion

Topic 6: Command Execution

Topic 7: Cross-Site Scripting

Topic 8: Cross-Site Request Forgery

Topic 9: Web Application Scanning with w3af

Module 14: Wireless Attacks

Topic 1: Setting Up

Topic 2: Monitor Mode

Topic 3: Capturing Packets

Topic 4: Open Wireless

Topic 5: Wired Equivalent Privacy

Topic 6: Wi-Fi Protected Access

Topic 7: WPA2

Topic 8: Wi-Fi Protected Setup

Module 15: Mobile Hacking

Topic 1: About the Smartphone Pentest Framework

Topic 2: Mobile Attack Vectors

Topic 3: The Smartphone Pentest Framework

Topic 4: Remote Attacks

Topic 5: Client-Side Attacks

Topic 6: Malicious Apps

Topic 7: Mobile Post Exploitation

Module 16: Advanced Exploits (If TIme Permits)

Topic 1: Understanding Buffer Overflows

Topic 2: Creating the Exploit Code

Topic 3: Compiling the Exploit Code

Topic 4: Uploading the Payload

Topic 5: Running the Code

Topic 6: Gathering Information and Taking Control

SETC Training on LinkedIn follow @CTESTraining Follow us on Facebook
  Programming Training
  Microsoft Training
  Network Training
  Management Training
  Server Training
  Microsoft Office Training
Site developed and authored by Jean-Marc Choquette