• Classroom
Course Description

Kali Training is designed to help attendees master the most heavily used exploitation distribution on the planet and see how they can wield it effectively in professional penetration testing. We analyze some of the most powerful and yet often overlooked capabilities of the Kali distribution with numerous exercises. Both pentesters and IT security professionals are encouraged to attend.

Learning Objectives

1. Penetration Testing Methodology

2. Kali Services

3. Basic BASH scripting

4. Target Scoping

5. Information Gathering

6. Target Discovery

7. Enumerating the Target

8. Vulnerability Mapping

9. Social Engineering

10. Exploit Development

11. Password Cracking

12. Web App Exploitation

13. Target Exploitation

14. Privilege Escalation

15. Maintaining Access

Framework Connections

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.