This course introduces ethical hackers and penetration testers to Kali Linux. This course will show IT professionals how to use the ethical hacking techniques and how to conduct a professional penetration test workflow using the Swiss Army Knife operating system Kali Linux.
Learning Objectives
- Installing and Configuring Kali Linux
- Pre-penetration Testing Checklist
- Information Gathering
- External Pen-testing
- Website Penetration Testing
- Internal Network Penetration Testing
- Network Sniffing
- Exploitation
- Social Engineering
- Wi-Fi Penetration Testing
- Brute Force Attack Testing
- Advanced Penetration Testing