SETC Training844-434-7382
 Find a Course: 
Programming TrainingMicrosoft TrainingMS Office TrainingServer TrainingManagement TrainingNetwork TrainingAbout UsContact Us

LINUX Training

Good course, instructor very knowledgeable and likeable.
Comment from HRSDC

1. Title

  • An Introduction to Penetration Testing with Linux Kali (PENIN, 3 days)
    View PDF

2. Course Pre-requisites

  • Sound fundamental knowledge of Linux and some previous security work or equivalent knowledge.

3. Target Audience

  • IT professionals who want to gain some foundational knowledge on penetration testing in a corporate environment

4. Dates and Pricing

Sep 20 to Sep 22, 2017$2,250.00/person
Dec 6 to Dec 8, 2017$2,250.00/person

5. Outline

Module 1: Linux Kali: The Bare Essentials

Topic 1: Setting up Linux Kali

Topic 2: A Note on Lab Configuration

Topic 3: A Quick Intro to the Linux Command Line

Topic 4: Touring the Linux File System

Topic 5: Mastering User Privilege and SELinux

Topic 6: All about File Permissions

Topic 7: Editing Files with VIM

Module 2: Linux Kali: A Few Useful Topics

Topic 1: About Runlevels and Boot

Topic 2: Managing Packages with apt-get

Topic 3: Managing Processes and Services

Topic 4: Setting up and Understanding IP Addresses and Hostnames

Topic 5: Mastering Netcat

Topic 6: Mastering the Firewall

Topic 7: A Quick Tour of TCPDump

Module 3: BASH Scripting and Other Programming

Topic 1: More on VIM Editing

Topic 2: Setting up your Profile

Topic 3: Working with Quotes

Topic 4: Working with Variables

Topic 5: Implementing Conditional Logic

Topic 6: Implementing Repeating Logic

Topic 7: A Few More Advanced Concepts

Topic 8: Writing Python Scripts: A Quick Tour

Topic 9: Introduction to C Compilers

Topic 10: Writing and Compiling C Code

Module 4: Power Tools: The Metasploit Framework

Topic 1: What is the Metasploit Framework?

Topic 2: Starting and Updating Metasploit

Topic 3: Finding Metasploit Modules

Topic 4: Using Metasploit Modules

Topic 5: Setting Module Options

Topic 6: Working with Payloads

Topic 7: Setting a Payload Manually

Topic 8: Working with PostgreSql

Topic 9: Working with msfcli

Topic 10: Using msfvenom

Topic 11: Overview of Auxiliary Modules

Module 5: The Assessment Phase

Topic 1: The Basics of Intelligence Gathering

Topic 2: What does Port Scanning Provide?

Topic 3: The Details of nmap

Topic 4: More on nmap Scanning

Topic 5: Working with the nmap Scripting Engine

Topic 6: Working with Metasploit Scanners

Topic 7: Working with Metasploit Exploit Checking

Topic 8: Setting up ZAP Attack

Topic 9: Web Application Scanning with ZAP Attack

Module 6: Capturing Real Traffic

Topic 1: Overview of Network Capture Tools

Topic 2: Working with TCPDump

Topic 3: Working with Wireshark

Topic 4: ARP and DNS Cache Poisoning

Topic 5: SSL Attacks and SSL Stripping

Module 7: The Art of Exploitation: The Basics

Topic 1: Exploiting the SMB Protocol

Topic 2: Exploiting NFS Shares

Topic 3: Exploitation with WebDAV Default Credentials

Topic 4: Exploiting and Open phpMyAdmin

Topic 5: Downloading Sensitive Files

Topic 6: Exploiting a Buffer Overflow in Third-Party Software

Topic 7: Exploiting Third-Party Web Applications

Topic 8: Exploiting a Compromised Service

Topic 9: Exploiting Remote Desktop

Topic 10: A Brief Introduction to Metapreter

Module 8: Web Application Testing

Topic 1: Working with ZAP Attack

Topic 2: SQL Injection

Topic 3: XPath Injection

Topic 4: Local File Inclusion

Topic 5: Remote File Inclusion

Topic 6: Command Execution

Topic 7: Cross-Site Scripting

Topic 8: Cross-Site Request Forgery

Topic 9: Web Application Scanning with w3af

SETC Training on LinkedIn follow @CTESTraining Follow us on Facebook
  Programming Training
  Microsoft Training
  Network Training
  Management Training
  Server Training
  Microsoft Office Training
Site developed and authored by Jean-Marc Choquette