Penetration Testing with Kali Linux

Penetration Testing with Kali Linux

Penetration Testing with Kali Linux (PEN-200) is the foundational course at Offensive Security. Those new to OffSec or penetration testing should start here.

This online ethical hacking course is self-paced. It introduces penetration testing tools and techniques via hands-on experience. PEN-200 trains not only the skills, but also the mindset required to be a successful penetration tester. Students who complete the course and pass the exam earn the coveted Offensive Security Certified Professional (OSCP) certification.

Course Objectives

After completing this course, students will be able to :

  • Using multiple information gathering techniques to identify and enumerate targets running various operating systems and services.
  • Ability to write basic scripts and tools to aid in the penetration testing process
  • How to analyze, correct, modify, cross-compile, and port public exploit code.
  • Ability to successfully conduct both remote and client side attacks.
  • Ability to identify and exploit XSS, SQL injection, and file inclusion vulnerabilities in web applications – Expertise in deploying tunneling techniques to bypass firewalls

Target Audience

  • IT Professionals
  • System Administrator
  • Network Engineer
  • SOC Analyst
  • Pentesters

Course Pre-requisite

  • Penetration Testing with Kali Linux is a foundational course, but still requires students to have certain knowledge prior to attending the online class.
  • A solid understanding of TCP/IP , networking, and reasonable Linux skills are required.
  • Familiarity with Bash scripting along with basic Perlor Python is considered a plus.

Course Duration

Learning Network Penetration Testing with Kali Linux

1
Introducing Kali Linux
2
Getting Familiar with Hardware Requirements and Recommendations
3
Installing Kali Linux in VirtualBox
4
Installing Kali Linux on Raspberry Pi
5
Introducing Kali Linux Interface and Tools
6
Updating Kali Linux
7
Networking Fundamentals
8
Creating a Pen-Testing Lab Environment
9
What Is Penetration Testing?
10
Reconnaissance
11
Getting Familiar with Vulnerability Scanning
12
Gaining and Maintaining Access
13
Covering Tracks
14
Gathering Initial Information
15
Identifying Live Hosts
16
Discovering Open Ports
17
Uncovering Services and Fingerprinting the OS
18
Vulnerability Scanning with OpenVAS
19
Vulnerability Scanning with Nessus
20
Exploiting the Target System
21
Cracking the System Passwords
22
Post Exploitation
23
Defensive CounterMeasures

Kali Linux Penetration Testing Recipes

1
Installing VirtualBox & Kali Linux
2
Getting Used to Kali
3
Password Dictionaries
4
WordPress Vulnerability Testing
5
Burp Suite – Web Application Security Testing
6
Web Application Penetration Testing
7
Analysing the Source Code
8
Wireshark – Port Scanning
9
Domain Name Information and More
10
Testing SQL Injections
11
Deploying JSP Shell Attacks
12
Password Testing & Security Scanning
13
Searching for Outdated Software
14
DNS Spoofing & Reconnaissance
15
False Logins & Physical Location
16
Calling & Emailing
17
Social Gathering
18
Viewing Hidden SSID’s
19
Wireless Password Cracking- Part One
20
Wireless Password Cracking- Part Two
21
Intercepting Connections
22
IP Address Search
23
WhoIS and Domain Name WhoIS
24
Site Background
25
Finding Emails and Social Media Accounts
26
Stealth Reconnaissance on Protected Network
27
Intercepting Connections
28
Building Our Report
29
Test your Knowledge

Hands-On Web Penetration Testing with Kali Linux

1
Web Application and Security
2
OWASP Top 10
3
Vulnerability Assessment versus Penetration Testing
4
Ethical Hacker Responsibilities and Customer Expectations
5
Software and Hardware Requirements
6
Diagram and Design
7
Connectivity and Testing
8
Getting to Know the DVWA Interface
9
Brute Force, CSRF, and File Inclusion
10
SQL Injection
11
Cross-Site Scripting (XSS)
12
Command Execution
13
OWASP-ZAP
14
OWASP-ZAP Authenticated Scan
15
Burp Suite – Part 1 and Part 2
16
Development Security
17
Web Application Firewalls
18
Mod_Security

Practical Windows Penetration Testing

1
Disclaimer
2
Test Lab Architecture
3
Setting Up Kali
4
Setting Up Target Win 10 and Windows 16
5
Creating the Domain
6
Scanning and Service Identification
7
Using Public Exploits
8
Exploiting with Metasploit
9
Social Engineering
10
Evading Anti-Virus
11
Final Word on Exploitation
12
About Post-Exploitation
13
Meterpreter
14
Privilege Escalation
15
Collecting Credentials
16
Password Brute-Force
17
Achieving Persistence
18
Pivoting and Pass-the-Hash Attack
19
Bonus Lecture and Test your Knowledge

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Lectures: 89
Video: 40 Hours

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed

Login Or Register