Penetration Testing with Kali Linux

Do you want to become a pro with the tools that Kali Linux offers? To perform advanced penetration testing? Learn and practice ways to exploit the vulnerable systems and patch them! Get ready to make the best use of one of the most popular pen-testing tools fancied by hackers around the globe.

Online

৳8,750

৳17,500/- 50 % off

৳8,750

৳17,500/- 50 % off

Join Now
In this course you get
  • 40 Hrs Instructor-Led Training
  • Instant Doubt Clearing
  • Course Kit Includes eCourseware
  • One-On-One Learning Assistance
  • Help Desk Support
  • Industry-Relevant Hands-On
  • Labs Modern Case Studies
  • Certificate of Completion

What You'll Learn Penetration Testing with Kali Linux
Study Plan
Module 20 টি live class 40 টি Assignment 20 টি Live test 40 টি Quize test 17 টি
  • Lesson 1

    • The Practice of Cybersecurity • Threats and Threat Actors • The CIA Triad • Security Principles, Controls, and Strategies

  • Lesson 2

    • Cybersecurity Laws, Regulations, Standards, and Frameworks • Career Opportunities in Cybersecurity

  • Lesson 1

    • Whois Enumeration • Google Hacking • Netcraft

  • Lesson 2

    • Open-Source Code • Shodan • Security Headers and SSL/TLS

  • Lesson 1

    • DNS Enumeration • TCP/UDP Port Scanning • Port Scanning with Nmap

  • Lesson 2

    • SMB Enumeration • SMTP Enumeration • SNMP Enumeration

  • Lesson 1

    • Vulnerability Scanning Theory • How Vulnerability Scanners Work • Vulnerability Scanning with Nessus

  • Lesson 2

    • Vulnerability Scanning with Nmap • Scanning with Masscan • Wrapping Up

  • Lesson 1

    • Web Application Assessment Methodology • Web Application Assessment Tools

  • Lesson 2

    • Web Application Enumeration • Cross-Site Scripting

  • Lesson 1

    • Directory Traversal • File Inclusion Vulnerabilities

  • Lesson 2

    • File Upload Vulnerabilities • Command Injection

  • Lesson 1

    • SQL Theory and Databases • Manual SQL Exploitation

  • Lesson 2

    • Manual Code Execution • Automated Code Execution

  • Lesson 1

    • Target Reconnaissance • Exploiting Microsoft Office • Abusing Windows Library Files

About Course

Penetration Testing with Kali Linux

📊Unlock Your Potential with Penetration Testing!📊

About Course

Have you ever wondered how to test the security of web applications? Managing Windows security has always been a challenge for every security professional. Since Windows is the most popular operating system in the company, this course will help you identify and prevent attacks early to protect your data and money! Kali has been identified as the #1 secure operating system for Linux hackers. Kali Linux provides several ways to scan an IP, port, or host (or a set of IPs, ports, and hosts) to identify vulnerabilities and security holes and the output and information this provides can be at the forefront of penetration testing efforts in. This tutorial takes a practical approach with step-by-step recipes to conduct effective penetration testing using the powerful Kali Linux! Initially, you will develop your skills through wireless cracking, Man-in-the-Middle, and Denial of Service (DOS) attacks. Also, explore tools like Metasploit, Wireshark, Nmap, etc. to easily find vulnerabilities! Finally, you can optimize all the steps in a specific penetration testing project that focus on Windows tools and related methods. By the end of the course, you will be one step ahead of hackers by identifying and fixing vulnerabilities in your network as well as performing professional level web penetration testing!


Contents and Overview

This training program consists of 4 complete courses, carefully selected to provide you with the most comprehensive training. The first course, Learning Network Penetration Testing with Kali Linux, is about finding and fixing vulnerabilities in your network. Learn how to test your network against different types of attacks. We will show viewers how to install Kali Linux, discuss the various stages of pen testing, etc. By the end of this section, you will know the tools Kali Linux provides for network penetration testing, how to use vulnerable systems and how to patch they.

The second course, Kali Linux Penetration Testing Recipes, covers End-to-End penetration testing solutions. This course covers several great resources within Kali Linux and you'll use them to perform a full website and server vulnerability test, brute-force your way past passwords, search for back-doors, and other tasks. Finally, you'll create a professional report and hand it to your client.


The third course, Hands-On Web Penetration Testing with Kali Linux, covers testing web security with Kali Linux. Have you ever wondered how to test web applications security? This course will teach you about web application vulnerabilities and how to use Kali Linux tools to perform web penetration testing to professional standards. You will start with application security and learn about the process of web penetration testing. Then you'll create a test lab with Oracle VirtualBox and Kali Linux. Next, you'll learn about common vulnerabilities in web applications with practical examples, which will help you understand the process of penetration testing and the importance of security. Now you'll be introduced to different tools to assess and analyze web application vulnerabilities. In the end, you'll learn to secure web applications.

By the end of the course, you'll be able to perform web penetration testing using Kali Linux.

The fourth course, Practical Windows Penetration Testing, covers Attacking & securing Windows systems with Metasploit and Kali Linux. This course will follow a typical penetration test scenario throughout. At each stage, you will be shown all the necessary tools and techniques, and how they are applied. The whole course is hands-on to guarantee that you gain practical knowledge. You will start by setting up the environment and learn service identification and network scanning techniques. You will master various exploitation and post exploitation techniques. You will also learn to proxy traffic and implement the most famous hacking technique: the pass-the-hash attack.

By the end of this video tutorial, you will be able to successfully identify and tackle the flaws and vulnerabilities within the Windows OS (versions 7, 8.1, 10) using Metasploit and Kali Linux tools.

By the end of the course, you’ll conquer the world of PyTorch to build useful and effective Deep Learning models with the PyTorch Deep Learning framework!


About the Authors

Sujit Mandal has more than 9 years of experience as Information Security Trainer, Lecturer and Course Developer.. He is a professionalized Ethical hacker & software developer. About Kali Linux, he uses Kali Linux frequently and is very passionate about systems and network security. The other technologies that interest Cristian are Java development, Machine learning, Cloud Computing. Web development, mobile applications development, home automation systems, SEO are the other technical skills he possess

Mahedi Hasan Experienced System & Network professional with a strong background in Linux Systems Administration. With over a decade of experience, I have worked in various permanent and project-based organizations, playing a crucial role in implementing and maintaining infrastructure and applications. One of my key areas of expertise is managing application's hosting services, including DNS, Web, Mail, VPS, DevOps, Cloud and dedicated servers. Currently, I'm working as a Network Engineer in the ICT Cell at University of Dhaka. Prior to this, I served various roles including Sr. System Engineer and Technology Specialist (innovation) at BdREN for more than eight years, where I made significant contributions to the development and operations of their infrastructure. One notable accomplishment was introducing the Educational Roaming Service (eduroam) in Bangladesh, facilitating seamless network connectivity for educational institutions. As a trainer, I conduct national and international workshops, sharing my knowledge and skills. I have completed internships at OARnet, USA, and NORDUnet, Sweden, and participated in various training programs and workshops worldwide, including AIT Thailand, Global Knowledge Korea, APAN-45 Singapore, and APAN-46 New Zealand. With a strong passion for innovation and a deep understanding of systems and networks, I bring a wealth of expertise to any organization. I am committed to delivering high-quality solutions, leveraging my skills in Linux Systems Administration and network engineering to drive technological advancements and contribute to the success of your team.

Fazle Rabbi Shalek Ahmed is an information security architect. He has worked with business to define frameworks, perform risk and gap analysis, and identify security controls and roadmaps. He also works with stakeholders to plan, organize, and manage the successful delivery of security strategies and projects as well as the stable operation of the organization's IT infrastructure security, integration, and optimization.

His key skills are:

Enterprise security architecture design and business alignment
Risk assessment, management, compliance, and auditing
Evaluating and analyzing IT security technologies and solutions
Monitoring and measuring the effectiveness of IT security controls
Vulnerability assessment and penetration testing

Md. Golam Kibria,Innovative IT Professional with over 15+ years of combined experience in computer and mobile forensic, PKI technology, penetration testing and vulnerability assessment as well as Training and Cyber Security Audit. Demonstrated expertise implementing Digital Forensic Lab, PKI Infrastructure, data security policies, protecting information assets to support organizational goals.

Instructors
Sujit Mandal

Software Engineer & Cybersecurity Specialist.

Mahedi Hasan

Network Engineer in the ICT Cell at DU

Fazle Rabbi Shalek Ahmed

Cyber Security Specialists

Md. Golam Kibria

Cyber Security Specialists

যেকোনো তথ্যের জন্যে কল করুন 01743188288, 01783371324 (সকাল ১০টা থেকে রাত ১০টা) ।

Please login to review

Training Schedule

  • upcoming classes
  • corporate training
  • 1 on 1 training
Upcoming classes
Certified Ethical Hacker (CEH) v13 with Advanced AI Techniques Online CEHAI Thursday, January 30, 2025 BATCH OPEN Enroll Now
Cyber Security-Certified Ethical Hacker (CEH) Online CEH11 Saturday, February 1, 2025 9 SEAT LEFT Enroll Now
CompTIA Security + (SY0-701) Online CS3 Wednesday, January 29, 2025 10 SEAT LEFT Enroll Now
Penetration Testing with Kali Linux Online PTL Friday, January 31, 2025 BATCH OPEN Enroll Now
Diploma in Cyber Security and Ethical Hacking Online DC6 Saturday, February 1, 2025 BATCH OPEN Enroll Now
Certified Penetration Testing Professional (CPENT) Online PTP Saturday, February 1, 2025 BATCH OPEN Enroll Now
Certified SOC Analyst (C|SA) Online SA1 Wednesday, January 29, 2025 BATCH OPEN Enroll Now
OSINT: Open-Source Intelligence Online OSI9 Saturday, February 1, 2025 BATCH OPEN Enroll Now
corporate training

Our Corporate Training Solutions: Why We're the Best

  • Upskill your team on the latest technologies.
  • Solutions tailored to meet your needs
  • Analyze your training needs for free
  • Providing training based on skill sets
  • Secure your organizations inside-out

Want to train your employees?

Get tailor-made solutions for your specific needs. We are happy to provide you with a quote!

1-on-1 training

Why Go for 1-on-1 Training?g

  • Receive tailored guidance to suit your needs.
  • Benefit from content designed specifically for you.
  • Learn at a time that works best for you.
  • Get immediate answers to your questions.
  • Guaranteed session delivery

Are you looking for personalized attention?

Make an exclusive batch request, with a flexible schedule, that is tailored just for you. Request 1-on-1 Training Today!