Kali Linux Penetration Testing Bible
Become an expert in penetration testing with the course Kali Linux Penetration Testing Bible. Designed for red teamers, ethical hackers, and defensive specialists, this course offers interactive lessons, quizzes, and hands-on labs to enhance your skills. Explore the powerful tools of Kali Linux, master pentesting techniques, and gain expertise in digital forensics and reverse engineering. Stay ahead in the field of cybersecurity by learning how to identify vulnerabilities and automate testing.
- Price: $279.99
- Delivery method: eLearning
- DIR Discount: 20%
Submit form to obtain discount
Test Prep
Features
32+ LiveLab |
32+ Video tutorials |
59+ Minutes
Why choose TOPTALENT?
- Get assistance every step of the way from our Texas-based team, ensuring your training experience is hassle-free and aligned with your goals.
- Access an expansive range of over 3,000 training courses with a strong focus on Information Technology, Business Applications, and Leadership Development.
- Have confidence in an exceptional 95% approval rating from our students, reflecting outstanding satisfaction with our course content, program support, and overall customer service.
- Benefit from being taught by Professionally Certified Instructors with expertise in their fields and a strong commitment to making sure you learn and succeed.
Outline
Lessons 1:
Introduction
- What Does This Course Cover?
Lessons 2:
Mastering the Terminal Window
- Kali Linux File System
- Managing Users and Groups in Kali
- Files and Folders Management in Kali Linux
- Remote Connections in Kali
- Kali Linux System Management
- Networking in Kali Linux
- Summary
Lessons 3:
Bash Scripting
- Basic Bash Scripting
- Printing to the Screen in Bash
- Variables
- Script Parameters
- User Input
- Functions
- Conditions and Loops
- Summary
Lessons 4:
Network Hosts Scanning
- Basics of Networking
- Network Scanning
- DNS Enumeration
- Summary
Lessons 5:
Internet Information Gathering
- Passive Footprinting and Reconnaissance
- Summary
Lessons 6:
Social Engineering Attacks
- Spear Phishing Attacks
- Payloads and Listeners
- Social Engineering with the USB Rubber Ducky
- Summary
Lessons 7:
Advanced Enumeration Phase
- Transfer Protocols
- E‐mail Protocols
- Database Protocols
- CI/CD Protocols
- Web Protocols 80/443
- Graphical Remoting Protocols
- File Sharing Protocols
- Summary
Lessons 8:
Exploitation Phase
- Vulnerabilities Assessment
- Services Exploitation
- Summary
Lessons 9:
Web Application Vulnerabilities
- Web Application Vulnerabilities
- Summary
Lessons 10:
Web Penetration Testing and Secure Software Development Lifecycle
- Web Enumeration and Exploitation
- Secure Software Development Lifecycle
- Summary
Lessons 11:
Linux Privilege Escalation
- Introduction to Kernel Exploits and Missing Configurations
- Kernel Exploits
- SUID Exploitation
- Overriding the Passwd Users File
- CRON Jobs Privilege Escalation
- sudoers
- Exploiting Running Services
- Automated Scripts
- Summary
Lessons 12:
Windows Privilege Escalation
- Windows System Enumeration
- File Transfers
- Windows System Exploitation
- Summary
Lessons 13:
Pivoting and Lateral Movement
- Dumping Windows Hashes
- Pivoting with Port Redirection
- Summary
Lessons 14:
Cryptography and Hash Cracking
- Basics of Cryptography
- Cracking Secrets with Hashcat
- Summary
Lessons 15:
Reporting
- Overview of Reports in Penetration Testing
- Scoring Severities
- Report Presentation
- Summary
Lessons 16:
Assembly Language and Reverse Engineering
- CPU Registers
- Assembly Instructions
- Data Types
- Memory Segments
- Addressing Modes
- Reverse Engineering Example
- Summary
Lessons 17:
Buffer/Stack Overflow
- Basics of Stack Overflow
- Stack Overflow Exploitation
- Summary
Lessons 18:
Programming with Python
- Basics of Python
- Running Python Scripts
- Debugging Python Scripts
- Practicing Python
- Python Basic Syntaxes
- Variables
- More Techniques in Python
- Summary
Lessons 19:
Pentest Automation with Python
- Penetration Test Robot
- Summary
Lessons 20:
APPENDIX A: Kali Linux Desktop at a Glance
- Downloading and Running a VM of Kali Linux
- Kali Xfce Desktop
- Summary
Lessons 21:
APPENDIX B: Building a Lab Environment Using Docker
- Docker Technology
- Summary