• Classroom
  • Online, Instructor-Led
  • Online, Self-Paced
Course Description

Secbay latest Certified Kali Linux PenTester (CKLPT) training & certification program will be available from January , 2019. This training program will be available Virtual Live and as well as selected training locations world-wide.

Learning Objectives

Program Core Focus & Agenda : Intro to Kali Linux OS & Pen Testing, Installing and connecting to Kali Linux OS, Installing Virtual Machines, Utilizing the other most common and the latest Penetration Testing Tools, Understanding Latest Exploitations, Mastering & Reconnaissance with Recon-ng - Penetration Testing Tools for Kali Linux, Mastering Shodan with hands-on labs, Hands-on labs using the latest and as well as the most common working exploits, Mastering Metasploitable, Attacking Hosts, Social Engineering, Password Security Testing, Router & Wi-Fi Security testing, Hacking WiFi with and without dictionary, Web application penetration testing, Raspberry Pi. For complete program Outline and Details please send and email to training@certfirst.com or visit our website www.CertFirst.com. CertFirst offers multiple types of delivery methods[Classroom training, Customer/On-site training, Virtual Live Instructor-Led Training (VLIT),1-1 Mentoring, On Demand/Self Study training] to fit your schedule and requirements. Most of the Instructor-led Virtual Live training programs can be attended during weekdays as well as special evening and weekend sessions. Each offers intensive training but in different formats to provide flexibility.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Systems Analysis
  • Technology R&D
  • Test and Evaluation
  • Vulnerability Assessment and Management

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.