Penetration Testing with Kali (PWK) is a pen testing course designed for network administrators and security professionals who want to take a serious and meaningful step into the world of professional penetration testing. This unique penetration testing training course introduces students to the latest ethical hacking tools and techniques, including remote, virtual penetration testing labs for practicing the course materials. Penetration Testing with Kali Linux simulates a full penetration test from start to finish, by injecting the student into a target-rich, diverse, and vulnerable network environment.
Please note, there is an optional 24 hour lab based certification exam available to delegates who have sat this course. This exam leads to the Offensive Security Certified Professional (OSCP) certification and must be booked directly with Offensive Security.
Penetration Testing with Kali Linux is a foundational course, but still requires students to have certain knowledge prior to attending the online class. A solid understanding of TCP/IP, networking, and reasonable Linux skills are required. Familiarity with Bash scripting along with basic Perl or Python is considered a plus.
0 Penetration Testing: What You Should Know
1. Getting Comfortable with Kali Linux
2. The Essential Tools
3. Passive Information Gathering
4. Active Information Gathering
5. Vulnerability Scanning
6. Buffer Overflows
7. Win32 Buffer Overflow Exploitation
8. Linux Buffer Overflow Exploitation
9. Working with Exploits
10. File Transfers
11. Privilege Escalation
12. Client Side Attacks
13. Web Application Attacks
14. Password Attacks
15. Port Redirection and Tunneling
16. The Metasploit Framework
17.Bypassing Antivirus Software
18. Assembling the Pieces: Penetration Test Breakdown