Management with adaptable practices
We denounce with righteous indige nation and dislike men who are so beguiled and demo realized by the charms of pleasure of the moment, so blinded by desire, that they cannot foresee the pain and trouble that are bound to ensue cannot foresee. These cases are perfectly simple and easy to distinguish. In a free hour, when our power of choice is untrammelled data structures manages data in technology.
Kali Linux Fundamentals Course Outline
Getting Started with Kali Linux
- Define Kali Linux
- Download and Install Virtual Box
- Installing Kali Linux
- Updating Kali
- Laboratory Setup
Information Gathering and Vulnerability Analysis Tools
- NMAP and ZenMAP
- Stealth Scan
- Searchsploit
- DNS and LBD tools
- Hping3
- Cisco Auditing Tools
- Cisco Global Exploiter
- BED
Kali Linux Wireless Attacks
- Fern WIFI Cracker
- Kismet and GISKismet
- Ghost Phisher
- Wifite
Website Penetration Testing
-
Vega Usage
ZapProxy
Database Tools Usage
CMS and SSL Scanning Tools
Website Penetration and Exploitation Testing
- Metasploit
- Armitage
- BeEF
- p0f and pdf-parser
- Dumpzilla
- DFF
Kali Linux Social Engineering
- Social Engineering Toolkit Usage
Stressing Tools
- Slowhttptest
- Inviteflood
- laxflood
- thc-ssl-dos
Sniffing and Spoofing
- Burpsuite
- mitmproxy
- Wireshark
- sslstrip
Password Cracking Tools
- Hydra
- Johnny
- john
- Rainbowcrack
- SQLdict
- hash-identifier
Maintaining Access
- Powersploit
- Sbd
- Webshells
- Weevely
- http-tunnel
- dns2tcp
- cryptcat
Overview of Reverse Engineering
- OllyDbg
- dex2jar
- jd-gui
- apktool
Kali Linux Reporting Tools
- Dradis
- Metagoofil
Prerequisites
There are no formal prerequisites for attending this course. However, a basic understanding of the Linux operating system would be beneficial.
Audience
Anyone who wishes to gain knowledge of the fundamentals of Kali Linux can attend this course.
Kali Linux Fundamentals Course Overview
Kali Linux is a Debian-based Linux distribution OS used for penetration testing and security auditing. It is comprised of various tools used for several information security tasks such as computer forensics, reverse engineering, security research, and penetration testing. This Kali Linux Fundamentals course is designed to provide you with a complete understanding of Kali Linux and how to use it in practice.
In this 1-day training course, delegates will be introduced to the various tools of Kali Linux. Delegates will get an in-depth view of working with Kali Linux for strengthening network security. In addition, delegates will gain knowledge of wireless attacks, website penetration testing, and social engineering.
During this Kali Linux Fundamentals course, delegates will learn about stressing tools and password cracking tools. Throughout the course, delegates will come across several topics which will develop your knowledge about Kali Linux. Delegates will get an understanding of sniffing and spoofing as well as reverse engineering. After completing this course, you will be at moderate level expertise from where you can take yourself to the next levels.
- Delegate pack consisting of course notes and exercises
- Manual
- Experienced Instructor
EU GDPR Practitioner Exam Information
The GDPR Practitioner exam assesses a candidate’s knowledge of compliance mechanisms, cloud and third-party processing, the stipulations of the GDPR, Data Protection Impact Assessments, security breaches, and the expectations of GDPR-mandated roles. The exam consists of:
- Type: Multiple choice questions
- Duration: 1 hour 30 minutes
- Pass mark: 55%
- Open Book: Yes