Kali Linux - Backtrack Evolved: Assuring Security by Penetration Testing

Course

Online

£ 10 VAT inc.

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Secure your networks against attacks, hacks, and intruders with this fast paced and intensive security course using Kali Linux.Kali Linux is the latest Linux distribution from Offensive Security, custom-built for the distinct purposes of performing network security audits and forensic investigations. Kali comes fully loaded with hundreds of integrated tools to perform every aspect of a penetration test.Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide helps you to develop practical and useful professional skills in the information security industry, while simultaneously delivering the high level of excitement and exhilaration that goes hand-in-hand with the world of computer and network hacking.Cyber-crime is on the rise and information security is becoming more paramount than ever before. A single attack on a company’s network infrastructure can often result in irreparable damage to a company’s assets and/or reputation.It is no longer sufficient to merely rely on traditional security measures. In order to ensure the security of critical information assets, it is essential to become familiar with the strategies, tactics, and techniques that are used by actual hackers who seek to compromise your network.Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide will prepare you to enter the world of professional hacking by ensuring that you are well versed with the skills needed and tools used to compromise the security of enterprise networks and information systems.About the Author
.
Justin Hutchens currently works as a security consultant and regularly performs penetration tests and security assessments for a wide range of clients. He previously served in the United States Air Force where he worked as an intrusion detection specialist, network vulnerability analyst and malware forensic investigator for a large enterprise network with over 55,000 networked systems

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Prepare a fully-functional and low-budget security lab, where you can practice and develop your penetration testing skills without fear of legal consequence
Gather information about a target with advanced reconnaissance techniques
Identify target systems on a network using host discovery tools
Identify services running on target systems by scanning and enumeration
Discover vulnerabilities to determine potential attack vectors
Launch automated exploits and payloads using the Metasploit Framework
Learn a variety of hands-on techniques to exploit target systems
Establish backdoors to ensure continued access
Escalate privileges to acquire maximum control over compromised systems

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 4 years

Subjects

  • Network Training
  • Install
  • Systems
  • Image
  • Operating Systems
  • Hacking
  • Installation
  • Firewall
  • Network
  • Server
  • Linux
  • Networks
  • Windows
  • Testing

Course programme

Lab Preparation 5 lectures 16:09 Developing a Network Environment Must have multiple virtual machines for a test lab / acquire images from multiple locations
  • Download Linux distro operating systems from DistroWatch
  • Acquire trial Windows operating systems from Microsoft Technet
  • Students can acquire a fully licensed Microsoft software from DreamSpark
How to Install Oracle VirtualBox Must manage network operating systems in a singe virtual environment / install the VirtualBox virtualization software
  • Download VirtualBox from virtualbox.org and install
  • Create a virtual machine
  • Configure virtual machine settings
How to Install VMware Player Must manage the network operating systems in a singe virtual environment / install the VMware virtualization software
  • Download VMware Player from vmware.com and install it
  • Create a virtual machine
  • Configure virtual machine settings
How to Install Kali Linux Need a Kali Linux virtual machine for performing penetration tests / install Backtrack 5
  • Download Kali Linux image file
  • Launch live boot of Kali Linux from a virtual machine
  • Follow guided install to complete installation
Increasing Network Attack Surface Must have vulnerable systems to perform penetration testing techniques / modify security policies on network systems to increase vulnerabilities
  • Turn off the firewall, automatic updates, and remove installed updates on host systems
  • Install unnecessary roles and features on server systems
  • Install Metasploitable, an intentionally vulnerable Linux distribution
Lab Preparation 5 lectures 16:09 Developing a Network Environment Must have multiple virtual machines for a test lab / acquire images from multiple locations
  • Download Linux distro operating systems from DistroWatch
  • Acquire trial Windows operating systems from Microsoft Technet
  • Students can acquire a fully licensed Microsoft software from DreamSpark
How to Install Oracle VirtualBox Must manage network operating systems in a singe virtual environment / install the VirtualBox virtualization software
  • Download VirtualBox from virtualbox.org and install
  • Create a virtual machine
  • Configure virtual machine settings
How to Install VMware Player Must manage the network operating systems in a singe virtual environment / install the VMware virtualization software
  • Download VMware Player from vmware.com and install it
  • Create a virtual machine
  • Configure virtual machine settings
How to Install Kali Linux Need a Kali Linux virtual machine for performing penetration tests / install Backtrack 5
  • Download Kali Linux image file
  • Launch live boot of Kali Linux from a virtual machine
  • Follow guided install to complete installation
Increasing Network Attack Surface Must have vulnerable systems to perform penetration testing techniques / modify security policies on network systems to increase vulnerabilities
  • Turn off the firewall, automatic updates, and remove installed updates on host systems
  • Install unnecessary roles and features on server systems
  • Install Metasploitable, an intentionally vulnerable Linux distribution
Developing a Network Environment Must have multiple virtual machines for a test lab / acquire images from multiple locations
  • Download Linux distro operating systems from DistroWatch
  • Acquire trial Windows operating systems from Microsoft Technet
  • Students can acquire a fully licensed Microsoft software from DreamSpark
Developing a Network Environment Must have multiple virtual machines for a test lab / acquire images from multiple locations
  • Download Linux distro operating systems from DistroWatch
  • Acquire trial Windows operating systems from Microsoft Technet
  • Students can acquire a fully licensed Microsoft software from DreamSpark
Developing a Network Environment Must have multiple virtual machines for a test lab / acquire images from multiple locations
  • Download Linux distro operating systems from DistroWatch
  • Acquire trial Windows operating systems from Microsoft Technet
  • Students can acquire a fully licensed Microsoft software from DreamSpark
Developing a Network Environment Must have multiple virtual machines for a test lab / acquire images from multiple locations
  • Download Linux distro operating systems from DistroWatch
  • Acquire trial Windows operating systems from Microsoft Technet
  • Students can acquire a fully licensed Microsoft software from DreamSpark
Must have multiple virtual machines for a test lab / acquire images from multiple locations
  • Download Linux distro operating systems from DistroWatch
  • Acquire trial Windows operating systems from Microsoft Technet
  • Students can acquire a fully licensed Microsoft software from DreamSpark
Must have multiple virtual machines for a test lab / acquire images from multiple locations
  • Download Linux distro operating systems from DistroWatch
  • Acquire trial Windows operating systems from Microsoft Technet
  • Students can acquire a fully licensed Microsoft software from DreamSpark
How to Install Oracle VirtualBox Must manage network operating systems in a singe virtual environment / install the VirtualBox virtualization software
  • Download VirtualBox from virtualbox.org and install
  • Create a virtual machine
  • Configure virtual machine settings
How to Install Oracle VirtualBox Must manage network operating systems in a singe virtual environment / install the VirtualBox virtualization software
  • Download VirtualBox from virtualbox.org and install
  • Create a virtual machine
  • Configure virtual machine settings
How to Install Oracle VirtualBox Must manage network operating systems in a singe virtual environment / install the VirtualBox virtualization software
  • Download VirtualBox from virtualbox.org and install
  • Create a virtual machine
  • Configure virtual machine settings
How to Install Oracle VirtualBox Must manage network operating systems in a singe virtual environment / install the VirtualBox virtualization software
  • Download VirtualBox from virtualbox.org and install
  • Create a virtual machine
  • Configure virtual machine settings
Must manage network operating systems in a singe virtual environment / install the VirtualBox virtualization software
  • Download VirtualBox from virtualbox.org and install
  • Create a virtual machine
  • Configure virtual machine settings
Must manage network operating systems in a singe virtual environment / install the VirtualBox virtualization software
  • Download VirtualBox from virtualbox.org and install
  • Create a virtual machine
  • Configure virtual machine settings
How to Install VMware Player Must manage the network operating systems in a singe virtual environment / install the VMware virtualization software
  • Download VMware Player from vmware.com and install it
  • Create a virtual machine
  • Configure virtual machine settings
How to Install VMware Player Must manage the network operating systems in a singe virtual environment / install the VMware virtualization software
  • Download VMware Player from vmware.com and install it
  • Create a virtual machine
  • Configure virtual machine settings
How to Install VMware Player Must manage the network operating systems in a singe virtual environment / install the VMware virtualization software
  • Download VMware Player from vmware.com and install it
  • Create a virtual machine
  • Configure virtual machine settings
How to Install VMware Player Must manage the network operating systems in a singe virtual environment / install the VMware virtualization software
  • Download VMware Player from vmware.com and install it
  • Create a virtual machine
  • Configure virtual machine settings
Must manage the network operating systems in a singe virtual environment / install the VMware virtualization software
  • Download VMware Player from vmware.com and install it
  • Create a virtual machine
  • Configure virtual machine settings
Must manage the network operating systems in a singe virtual environment / install the VMware virtualization software
  • Download VMware Player from vmware.com and install it
  • Create a virtual machine
  • Configure virtual machine settings
How to Install Kali Linux Need a Kali Linux virtual machine for performing penetration tests / install Backtrack 5
  • Download Kali Linux image file
  • Launch live boot of Kali Linux from a virtual machine
  • Follow guided install to complete installation
How to Install Kali Linux Need a Kali Linux virtual machine for performing penetration tests / install Backtrack 5
  • Download Kali Linux image file
  • Launch live boot of Kali Linux from a virtual machine
  • Follow guided install to complete installation
How to Install Kali Linux Need a Kali Linux virtual machine for performing penetration tests / install Backtrack 5
  • Download Kali Linux image file
  • Launch live boot of Kali Linux from a virtual machine
  • Follow guided install to complete installation
How to Install Kali Linux Need a Kali Linux virtual machine for performing penetration tests / install Backtrack 5
  • Download Kali Linux image file
  • Launch live boot of Kali Linux from a virtual machine
  • Follow guided install to complete installation
Need a Kali Linux virtual machine for performing penetration tests / install Backtrack 5
  • Download Kali Linux image file
  • Launch live boot of Kali Linux from a virtual machine
  • Follow guided install to complete installation
Need a Kali Linux virtual machine for performing penetration tests / install Backtrack 5
  • Download Kali Linux image file
  • Launch live boot of Kali Linux from a virtual machine
  • Follow guided install to complete installation
Increasing Network Attack Surface Must have vulnerable systems to perform penetration testing techniques / modify security policies on network systems to increase vulnerabilities
  • Turn off the firewall, automatic updates, and remove installed updates on host systems
  • Install unnecessary roles and features on server systems
  • Install Metasploitable, an intentionally vulnerable Linux distribution
Increasing Network Attack Surface Must have vulnerable systems to perform penetration testing techniques / modify security policies on network systems to increase vulnerabilities
  • Turn off the firewall, automatic updates, and remove installed updates on host systems
  • Install unnecessary roles and features on server systems
  • Install Metasploitable, an intentionally vulnerable Linux distribution
Increasing Network Attack Surface Must have vulnerable systems to perform penetration testing techniques / modify security policies on network systems to increase vulnerabilities
  • Turn off the firewall, automatic updates, and remove installed updates on host systems
  • Install unnecessary roles and features on server systems
  • Install Metasploitable, an intentionally vulnerable Linux distribution
Increasing Network Attack Surface Must have vulnerable systems to perform penetration testing techniques / modify security policies on network systems to increase vulnerabilities
  • Turn off the firewall, automatic updates, and remove installed updates on host systems
  • Install unnecessary roles and features on server systems
  • Install Metasploitable, an intentionally vulnerable Linux distribution
Must have vulnerable systems to perform penetration testing techniques / modify security policies on network systems to increase vulnerabilities
  • Turn off the firewall, automatic updates, and remove installed updates on host systems
  • Install unnecessary roles and features on server systems
  • Install Metasploitable, an intentionally vulnerable Linux distribution
Must have vulnerable systems to perform penetration testing techniques / modify security policies on network systems to increase vulnerabilities
  • Turn off the firewall, automatic updates, and remove installed updates on host systems
  • Install unnecessary roles and features on server systems
  • Install Metasploitable, an intentionally vulnerable Linux distribution
Information Gathering and Reconnaissance 5 lectures 19:00 Passive Reconnaissance Information gathering / use public resources and websites
  • Look at the target website and its historical archives
  • Profile company and employees using LinkedIn
  • Gather technical information with serversniff.net
Google Hacking Information gathering / use uniquely crafted Google queries
  • Use of Google search operators
  • Use of Google special characters
  • Use the Google Hacking database for unique queries
Subdomain Enumeration with Google Hacking Use a series of Google queries to enumerate target subdomains
  • Search exclusively in the target domain with a site operator
  • Use an appropriate syntax to search for subdomains and add results to the list
  • Remove the previous results and repeat the process
Reconnaissance Tools (Dmitry & Goofile) Information gathering / automated command-line tools (Dmitry & Goofile)
  • Use Dmitry to gather IP translations, netcraft info, subdomains, and email addresses
  • Use Goofile to enumerate files within a domain
  • Record information collected
Network Enumeration with Maltego Information gathering / an all-in-one translation tool (Maltego)
  • Introduce a point of departure
  • Perform Transforms to gather information on networked systems
  • Organize and manage the information collected
Information Gathering and Reconnaissance. 5 lectures 19:00 Passive Reconnaissance Information gathering / use public resources and websites
  • Look at the target website and its historical archives
  • Profile company and employees using LinkedIn
  • Gather technical information with serversniff script to create a layer 3 discovery script
Layer 3 Discovery Network discovery / discover remote hosts at layer...

Additional information

Prepare a fully-functional and low-budget security lab, where you can practice and develop your penetration testing skills without fear of legal consequence Gather information about a target with advanced reconnaissance techniques Identify target systems on a network using host discovery tools Identify services running on target systems by scanning and enumeration Discover vulnerabilities to determine potential attack vectors Launch automated exploits and payloads using the Metasploit Framework Learn a variety of hands-on techniques to exploit target systems Establish backdoors to ensure continued access Escalate privileges to acquire maximum control over compromised systems

Kali Linux - Backtrack Evolved: Assuring Security by Penetration Testing

£ 10 VAT inc.