Kali Linux - Backtrack Evolved: Assuring Security by Penetration Testing
Course
Online
Description
-
Type
Course
-
Methodology
Online
-
Start date
Different dates available
Secure your networks against attacks, hacks, and intruders with this fast paced and intensive security course using Kali Linux.Kali Linux is the latest Linux distribution from Offensive Security, custom-built for the distinct purposes of performing network security audits and forensic investigations. Kali comes fully loaded with hundreds of integrated tools to perform every aspect of a penetration test.Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide helps you to develop practical and useful professional skills in the information security industry, while simultaneously delivering the high level of excitement and exhilaration that goes hand-in-hand with the world of computer and network hacking.Cyber-crime is on the rise and information security is becoming more paramount than ever before. A single attack on a company’s network infrastructure can often result in irreparable damage to a company’s assets and/or reputation.It is no longer sufficient to merely rely on traditional security measures. In order to ensure the security of critical information assets, it is essential to become familiar with the strategies, tactics, and techniques that are used by actual hackers who seek to compromise your network.Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide will prepare you to enter the world of professional hacking by ensuring that you are well versed with the skills needed and tools used to compromise the security of enterprise networks and information systems.About the Author
.
Justin Hutchens currently works as a security consultant and regularly performs penetration tests and security assessments for a wide range of clients. He previously served in the United States Air Force where he worked as an intrusion detection specialist, network vulnerability analyst and malware forensic investigator for a large enterprise network with over 55,000 networked systems
Facilities
Location
Start date
Start date
About this course
Prepare a fully-functional and low-budget security lab, where you can practice and develop your penetration testing skills without fear of legal consequence
Gather information about a target with advanced reconnaissance techniques
Identify target systems on a network using host discovery tools
Identify services running on target systems by scanning and enumeration
Discover vulnerabilities to determine potential attack vectors
Launch automated exploits and payloads using the Metasploit Framework
Learn a variety of hands-on techniques to exploit target systems
Establish backdoors to ensure continued access
Escalate privileges to acquire maximum control over compromised systems
Reviews
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 4 years
Subjects
- Network Training
- Install
- Systems
- Image
- Operating Systems
- Hacking
- Installation
- Firewall
- Network
- Server
- Linux
- Networks
- Windows
- Testing
Course programme
- Download Linux distro operating systems from DistroWatch
- Acquire trial Windows operating systems from Microsoft Technet
- Students can acquire a fully licensed Microsoft software from DreamSpark
- Download VirtualBox from virtualbox.org and install
- Create a virtual machine
- Configure virtual machine settings
- Download VMware Player from vmware.com and install it
- Create a virtual machine
- Configure virtual machine settings
- Download Kali Linux image file
- Launch live boot of Kali Linux from a virtual machine
- Follow guided install to complete installation
- Turn off the firewall, automatic updates, and remove installed updates on host systems
- Install unnecessary roles and features on server systems
- Install Metasploitable, an intentionally vulnerable Linux distribution
- Download Linux distro operating systems from DistroWatch
- Acquire trial Windows operating systems from Microsoft Technet
- Students can acquire a fully licensed Microsoft software from DreamSpark
- Download VirtualBox from virtualbox.org and install
- Create a virtual machine
- Configure virtual machine settings
- Download VMware Player from vmware.com and install it
- Create a virtual machine
- Configure virtual machine settings
- Download Kali Linux image file
- Launch live boot of Kali Linux from a virtual machine
- Follow guided install to complete installation
- Turn off the firewall, automatic updates, and remove installed updates on host systems
- Install unnecessary roles and features on server systems
- Install Metasploitable, an intentionally vulnerable Linux distribution
- Download Linux distro operating systems from DistroWatch
- Acquire trial Windows operating systems from Microsoft Technet
- Students can acquire a fully licensed Microsoft software from DreamSpark
- Download Linux distro operating systems from DistroWatch
- Acquire trial Windows operating systems from Microsoft Technet
- Students can acquire a fully licensed Microsoft software from DreamSpark
- Download Linux distro operating systems from DistroWatch
- Acquire trial Windows operating systems from Microsoft Technet
- Students can acquire a fully licensed Microsoft software from DreamSpark
- Download Linux distro operating systems from DistroWatch
- Acquire trial Windows operating systems from Microsoft Technet
- Students can acquire a fully licensed Microsoft software from DreamSpark
- Download Linux distro operating systems from DistroWatch
- Acquire trial Windows operating systems from Microsoft Technet
- Students can acquire a fully licensed Microsoft software from DreamSpark
- Download Linux distro operating systems from DistroWatch
- Acquire trial Windows operating systems from Microsoft Technet
- Students can acquire a fully licensed Microsoft software from DreamSpark
- Download VirtualBox from virtualbox.org and install
- Create a virtual machine
- Configure virtual machine settings
- Download VirtualBox from virtualbox.org and install
- Create a virtual machine
- Configure virtual machine settings
- Download VirtualBox from virtualbox.org and install
- Create a virtual machine
- Configure virtual machine settings
- Download VirtualBox from virtualbox.org and install
- Create a virtual machine
- Configure virtual machine settings
- Download VirtualBox from virtualbox.org and install
- Create a virtual machine
- Configure virtual machine settings
- Download VirtualBox from virtualbox.org and install
- Create a virtual machine
- Configure virtual machine settings
- Download VMware Player from vmware.com and install it
- Create a virtual machine
- Configure virtual machine settings
- Download VMware Player from vmware.com and install it
- Create a virtual machine
- Configure virtual machine settings
- Download VMware Player from vmware.com and install it
- Create a virtual machine
- Configure virtual machine settings
- Download VMware Player from vmware.com and install it
- Create a virtual machine
- Configure virtual machine settings
- Download VMware Player from vmware.com and install it
- Create a virtual machine
- Configure virtual machine settings
- Download VMware Player from vmware.com and install it
- Create a virtual machine
- Configure virtual machine settings
- Download Kali Linux image file
- Launch live boot of Kali Linux from a virtual machine
- Follow guided install to complete installation
- Download Kali Linux image file
- Launch live boot of Kali Linux from a virtual machine
- Follow guided install to complete installation
- Download Kali Linux image file
- Launch live boot of Kali Linux from a virtual machine
- Follow guided install to complete installation
- Download Kali Linux image file
- Launch live boot of Kali Linux from a virtual machine
- Follow guided install to complete installation
- Download Kali Linux image file
- Launch live boot of Kali Linux from a virtual machine
- Follow guided install to complete installation
- Download Kali Linux image file
- Launch live boot of Kali Linux from a virtual machine
- Follow guided install to complete installation
- Turn off the firewall, automatic updates, and remove installed updates on host systems
- Install unnecessary roles and features on server systems
- Install Metasploitable, an intentionally vulnerable Linux distribution
- Turn off the firewall, automatic updates, and remove installed updates on host systems
- Install unnecessary roles and features on server systems
- Install Metasploitable, an intentionally vulnerable Linux distribution
- Turn off the firewall, automatic updates, and remove installed updates on host systems
- Install unnecessary roles and features on server systems
- Install Metasploitable, an intentionally vulnerable Linux distribution
- Turn off the firewall, automatic updates, and remove installed updates on host systems
- Install unnecessary roles and features on server systems
- Install Metasploitable, an intentionally vulnerable Linux distribution
- Turn off the firewall, automatic updates, and remove installed updates on host systems
- Install unnecessary roles and features on server systems
- Install Metasploitable, an intentionally vulnerable Linux distribution
- Turn off the firewall, automatic updates, and remove installed updates on host systems
- Install unnecessary roles and features on server systems
- Install Metasploitable, an intentionally vulnerable Linux distribution
- Look at the target website and its historical archives
- Profile company and employees using LinkedIn
- Gather technical information with serversniff.net
- Use of Google search operators
- Use of Google special characters
- Use the Google Hacking database for unique queries
- Search exclusively in the target domain with a site operator
- Use an appropriate syntax to search for subdomains and add results to the list
- Remove the previous results and repeat the process
- Use Dmitry to gather IP translations, netcraft info, subdomains, and email addresses
- Use Goofile to enumerate files within a domain
- Record information collected
- Introduce a point of departure
- Perform Transforms to gather information on networked systems
- Organize and manage the information collected
- Look at the target website and its historical archives
- Profile company and employees using LinkedIn
- Gather technical information with serversniff script to create a layer 3 discovery script
Additional information
Kali Linux - Backtrack Evolved: Assuring Security by Penetration Testing