An Introduction to Penetration Testing with Linux Kali
(PENIN, Live Instructor-Led Training, 3 days)

Dates and Pricing

Jan 17 to Jan 19, 2018$1,675/person Feb 14 to Feb 16, 2018$1,675/person Mar 14 to Mar 16, 2018$1,675/person


Linux Kali: The Bare Essentials
Setting up Linux Kali
A Note on Lab Configuration
A Quick Intro to the Linux Command Line
Touring the Linux File System
Mastering User Privilege and SELinux
All about File Permissions
Editing Files with VIM
Linux Kali: A Few Useful Topics
About Runlevels and Boot
Managing Packages with apt-get
Managing Processes and Services
Setting up and Understanding IP Addresses and Hostnames
Mastering Netcat
Mastering the Firewall
A Quick Tour of TCPDump
BASH Scripting and Other Programming
More on VIM Editing
Setting up your Profile
Working with Quotes
Working with Variables
Implementing Conditional Logic
Implementing Repeating Logic
A Few More Advanced Concepts
Writing Python Scripts: A Quick Tour
Introduction to C Compilers
Writing and Compiling C Code
Power Tools: The Metasploit Framework
What is the Metasploit Framework?
Starting and Updating Metasploit
Finding Metasploit Modules
Using Metasploit Modules
Setting Module Options
Working with Payloads
Setting a Payload Manually
Working with PostgreSql
Working with msfcli
Using msfvenom
Overview of Auxiliary Modules
The Assessment Phase
The Basics of Intelligence Gathering
What does Port Scanning Provide?
The Details of nmap
More on nmap Scanning
Working with the nmap Scripting Engine
Working with Metasploit Scanners
Working with Metasploit Exploit Checking
Setting up ZAP Attack
Web Application Scanning with ZAP Attack
Capturing Real Traffic
Overview of Network Capture Tools
Working with TCPDump
Working with Wireshark
ARP and DNS Cache Poisoning
SSL Attacks and SSL Stripping
The Art of Exploitation: The Basics
Exploiting the SMB Protocol
Exploiting NFS Shares
Exploitation with WebDAV Default Credentials
Exploiting and Open phpMyAdmin
Downloading Sensitive Files
Exploiting a Buffer Overflow in Third-Party Software
Exploiting Third-Party Web Applications
Exploiting a Compromised Service
Exploiting Remote Desktop
A Brief Introduction to Metapreter
Web Application Testing
Working with ZAP Attack
SQL Injection
XPath Injection
Local File Inclusion
Remote File Inclusion
Command Execution
Cross-Site Scripting
Cross-Site Request Forgery
Web Application Scanning with w3af