Kali 101

2 Day Course
Hands On
Code QAKALI101

Book Now - 1 Delivery Method Available:

Classroom Virtual Classroom Private Group - Virtual Self-Paced Online

Overview

This course aims to teach delegates about the Kali Linux penetration testing distribution and the capabilities and limitations of the various tools contained within.

This course is aimed at any individual who wishes to gain insight in to the capabilities of the Kali Linux cyber security testing tool kit. This course is ideal for IT and cyber security professionals.

Objectives

This two day Kali 101 course delivers individual modules, as described below:

  • The purpose of the Kali Linux distribution
  • The various ways in which Kali Linux can be loaded on to a system
  • Build a bootable Kali USB (to take away after the course)
  • The capabilities and limitations of Kali Linux
  • The different types of tools contained within Kali Linux
  • The negative effects which can be caused by tools within Kali Linux
  • The ways in which negative effects can be managed and mitigated
  • The prerequisites needed to conduct thorough testing using Kali Linux
  • How to use the different tools within Kali Linux, including:
    • Network Mapper (NMAP)
    • DNS Enumeration (dnsenum)
    • Metasploit (exploit framework)
    • Zed Attack Proxy (ZAP)
    • Burp Suite (Interception proxy)
    • Responder (MITM)
    • Fimap (LFI/RFI)
    • SQL injection tools (sqlmap)

Training Partners

We work with the following best of breed training partners using our bulk buying power to bring you a wider range of dates, locations and prices.

Modules

Hide all

Introduction to Kali Linux (5 topics)

  • The purpose of Kali Linux
  • The ways in which Kali Linux can be loaded on to a system
  • The capabilities and limitations of Kali Linux
  • The negative side effects of Kali Linux and how to manage them
  • The prerequisites needed to conduct thorough testing using Kali Linux

Kali Linux tools and techniques (4 topics)

  • The various types of tools contained within Kali Linux
  • How to maintain and configure tools within Kali Linux
  • How to use tools within Kali Linux
  • How to manage time while conducting tests

Hands-on Exercises (8 topics)

  • Configuring Kali Linux
  • Configuring vulnerability scanners
  • Performing host and service finger printing using NMAP
  • Configuring vulnerability scanners
  • Scanning applications for vulnerabilities
  • Testing applications
  • Exploiting both web and system applications
  • Performing authentication tests

Prerequisites

Experience with Linux is advantageous however it is not essential as the instructor will guide the delegates through each task.

Course PDF

Print

Share this Course

+1
Share

Recommend this Course

Sections