SETC Training844-434-7382
 Find a Course: 
 
Programming TrainingMicrosoft TrainingMS Office TrainingServer TrainingManagement TrainingNetwork TrainingAbout UsContact Us

LINUX Training


On behalf of the section here at CBSA I would like to thank you for putting in that extra effort to ensure that the course was a resounding success. Your concern for the participants getting the most out of the course was self-evident and very much appreciated. The participants found the extra day of lab time very worthwhile
Comment from CBSA

1. Title

  • The Complete Penetration Testing Workshop for IT Professionals: Exploring the Power of Linux Kali (PENCP, 5 days)
    View PDF

2. Course Pre-requisites

  • Sound fundamental knowledge of Linux and some previous security work or equivalent knowledge.

3. Target Audience

  • IT professionals who want to learn how to perform penetration testing in a corporate environment

4. Dates and Pricing


Jun 5 to Jun 9, 2017$3,350.00/person
Aug 14 to Aug 18, 2017$3,350.00/person
Nov 20 to Nov 24, 2017$3,350.00/person

5. Outline

Module 1: Linux Kali: The Bare Essentials

Topic 1: Setting up Linux Kali

Topic 2: A Note on Lab Configuration

Topic 3: A Quick Intro to the Linux Command Line

Topic 4: Touring the Linux File System

Topic 5: Mastering User Privilege and SELinux

Topic 6: All about File Permissions

Topic 7: Editing Files with VIM

Module 2: Linux Kali: A Few Useful Topics

Topic 1: About Runlevels and Boot

Topic 2: Managing Packages with apt-get

Topic 3: Managing Processes and Services

Topic 4: Setting up and Understanding IP Addresses and Hostnames

Topic 5: Mastering Netcat

Topic 6: Mastering the Firewall

Topic 7: A Quick Tour of TCPDump

Module 3: BASH Scripting and Other Programming

Topic 1: More on VIM Editing

Topic 2: Setting up your Profile

Topic 3: Working with Quotes

Topic 4: Working with Variables

Topic 5: Implementing Conditional Logic

Topic 6: Implementing Repeating Logic

Topic 7: A Few More Advanced Concepts

Topic 8: Writing Python Scripts: A Quick Tour

Topic 9: Introduction to C Compilers

Topic 10: Writing and Compiling C Code

Module 4: Power Tools: The Metasploit Framework

Topic 1: What is the Metasploit Framework?

Topic 2: Starting and Updating Metasploit

Topic 3: Finding Metasploit Modules

Topic 4: Using Metasploit Modules

Topic 5: Setting Module Options

Topic 6: Working with Payloads

Topic 7: Setting a Payload Manually

Topic 8: Working with PostgreSql

Topic 9: Working with msfcli

Topic 10: Using msfvenom

Topic 11: Overview of Auxiliary Modules

Module 5: The Assessment Phase

Topic 1: The Basics of Intelligence Gathering

Topic 2: What does Port Scanning Provide?

Topic 3: The Details of nmap

Topic 4: More on nmap Scanning

Topic 5: Working with the nmap Scripting Engine

Topic 6: Working with Metasploit Scanners

Topic 7: Working with Metasploit Exploit Checking

Topic 8: Setting up ZAP Attack

Topic 9: Web Application Scanning with ZAP Attack

Module 6: Capturing Real Traffic

Topic 1: Overview of Network Capture Tools

Topic 2: Working with TCPDump

Topic 3: Working with Wireshark

Topic 4: ARP and DNS Cache Poisoning

Topic 5: SSL Attacks and SSL Stripping

Module 7: The Art of Exploitation: The Basics

Topic 1: Exploiting the SMB Protocol

Topic 2: Exploiting NFS Shares

Topic 3: Exploitation with WebDAV Default Credentials

Topic 4: Exploiting and Open phpMyAdmin

Topic 5: Downloading Sensitive Files

Topic 6: Exploiting a Buffer Overflow in Third-Party Software

Topic 7: Exploiting Third-Party Web Applications

Topic 8: Exploiting a Compromised Service

Topic 9: Exploiting Remote Desktop

Module 8: The Art of Exploitation: Server Applications

Topic 1: Exploiting SSH

Topic 2: Exploiting Apache

Topic 3: Exploiting IIS Web Server

Topic 4: Exploiting FTP

Topic 5: Exploiting SQL Server

Topic 6: Exploiting Oracle

Topic 7: Exploiting MySQL

Module 9: Password Attacks

Topic 1: Password Management

Topic 2: Online Password Attacks

Topic 3: Offline Password Attacks

Topic 4: Dumping Plaintext Passwords from Memory with Windows Credential Editor

Module 10: Social Engineering

Topic 1: The Social-Engineer Toolkit

Topic 2: Spear-Phishing Attacks

Topic 3: Web Attacks

Topic 4: Mass Email Attacks

Topic 5: Multipronged Attacks

Module 11: Bypassing Antivirus Applications

Topic 1: Trojans

Topic 2: How Antivirus Applications Work

Topic 3: Microsoft Security Essentials

Topic 4: Getting Past an Antivirus Program

Topic 5: Hiding in Plain Sight

Module 12: After the Exploit

Topic 1: Introduction to Meterpreter

Topic 2: Working with Meterpreter Scripts

Topic 3: All about Metasploit Post-Exploitation Modules

Topic 4: Local Privilege Escalation

Topic 5: Local Information Gathering

Topic 6: Lateral Movement

Topic 7: Pivoting

Topic 8: Persistence

Module 13: Web Application Testing

Topic 1: Working with ZAP Attack

Topic 2: SQL Injection

Topic 3: XPath Injection

Topic 4: Local File Inclusion

Topic 5: Remote File Inclusion

Topic 6: Command Execution

Topic 7: Cross-Site Scripting

Topic 8: Cross-Site Request Forgery

Topic 9: Web Application Scanning with w3af

Module 14: Wireless Attacks

Topic 1: Setting Up

Topic 2: Monitor Mode

Topic 3: Capturing Packets

Topic 4: Open Wireless

Topic 5: Wired Equivalent Privacy

Topic 6: Wi-Fi Protected Access

Topic 7: WPA2

Topic 8: Wi-Fi Protected Setup

Module 15: Mobile Hacking

Topic 1: About the Smartphone Pentest Framework

Topic 2: Mobile Attack Vectors

Topic 3: The Smartphone Pentest Framework

Topic 4: Remote Attacks

Topic 5: Client-Side Attacks

Topic 6: Malicious Apps

Topic 7: Mobile Post Exploitation

Module 16: Advanced Exploits (If TIme Permits)

Topic 1: Understanding Buffer Overflows

Topic 2: Creating the Exploit Code

Topic 3: Compiling the Exploit Code

Topic 4: Uploading the Payload

Topic 5: Running the Code

Topic 6: Gathering Information and Taking Control

SETC Training on LinkedIn follow @CTESTraining Follow us on Facebook
  Programming Training
  Microsoft Training
  Network Training
  Management Training
  Server Training
  Microsoft Office Training
Site developed and authored by Jean-Marc Choquette