Thumb

Management with adaptable practices

We denounce with righteous indige nation and dislike men who are so beguiled and demo realized by the charms of pleasure of the moment, so blinded by desire, that they cannot foresee the pain and trouble that are bound to ensue cannot foresee. These cases are perfectly simple and easy to distinguish. In a free hour, when our power of choice is untrammelled data structures manages data in technology.

Kali Linux Fundamentals Course Outline

Getting Started with Kali Linux

  • Define Kali Linux
  • Download and Install Virtual Box
  • Installing Kali Linux
  • Updating Kali
  • Laboratory Setup

Information Gathering and Vulnerability Analysis Tools

  • NMAP and ZenMAP
  • Stealth Scan
  • Searchsploit
  • DNS and LBD tools
  • Hping3
  • Cisco Auditing Tools
  • Cisco Global Exploiter
  • BED

Kali Linux Wireless Attacks

  • Fern WIFI Cracker
  • Kismet and GISKismet
  • Ghost Phisher
  • Wifite

Website Penetration Testing

    Vega Usage ZapProxy Database Tools Usage CMS and SSL Scanning Tools

Website Penetration and Exploitation Testing

  • Metasploit
  • Armitage
  • BeEF
  • p0f and pdf-parser
  • Dumpzilla
  • DFF

Kali Linux Social Engineering

  • Social Engineering Toolkit Usage

Stressing Tools

  • Slowhttptest
  • Inviteflood
  • laxflood
  • thc-ssl-dos

Sniffing and Spoofing

  • Burpsuite
  • mitmproxy
  • Wireshark
  • sslstrip

Password Cracking Tools

  • Hydra
  • Johnny
  • john
  • Rainbowcrack
  • SQLdict
  • hash-identifier

Maintaining Access

  • Powersploit
  • Sbd
  • Webshells
  • Weevely
  • http-tunnel
  • dns2tcp
  • cryptcat

Overview of Reverse Engineering

  • OllyDbg
  • dex2jar
  • jd-gui
  • apktool

Kali Linux Reporting Tools

  • Dradis
  • Metagoofil

Prerequisites

There are no formal prerequisites for attending this course. However, a basic understanding of the Linux operating system would be beneficial.

Audience

Anyone who wishes to gain knowledge of the fundamentals of Kali Linux can attend this course.

Kali Linux Fundamentals Course Overview

Kali Linux is a Debian-based Linux distribution OS used for penetration testing and security auditing. It is comprised of various tools used for several information security tasks such as computer forensics, reverse engineering, security research, and penetration testing. This Kali Linux Fundamentals course is designed to provide you with a complete understanding of Kali Linux and how to use it in practice.

In this 1-day training course, delegates will be introduced to the various tools of Kali Linux. Delegates will get an in-depth view of working with Kali Linux for strengthening network security. In addition, delegates will gain knowledge of wireless attacks, website penetration testing, and social engineering.

During this Kali Linux Fundamentals course, delegates will learn about stressing tools and password cracking tools. Throughout the course, delegates will come across several topics which will develop your knowledge about Kali Linux. Delegates will get an understanding of sniffing and spoofing as well as reverse engineering. After completing this course, you will be at moderate level expertise from where you can take yourself to the next levels.

  • Delegate pack consisting of course notes and exercises
  • Manual
  • Experienced Instructor

EU GDPR Practitioner Exam Information

The GDPR Practitioner exam assesses a candidate’s knowledge of compliance mechanisms, cloud and third-party processing, the stipulations of the GDPR, Data Protection Impact Assessments, security breaches, and the expectations of GDPR-mandated roles. The exam consists of:

  • Type: Multiple choice questions
  • Duration: 1 hour 30 minutes
  • Pass mark: 55%
  • Open Book: Yes
4