Offensive Security - Penetration Testing With Kali Linux (PWK) 2020

Offensive Security - Penetration Testing With Kali Linux (PWK) 2020

Register & Get access to index
st5qdvy.jpg

Penetration Testing with Kali Linux is the foundational course at Offensive Security. Those new to OffSec or penetration testing should start here.

This online ethical hacking course is self-paced. It introduces penetration testing tools and techniques via hands-on experience. PWK trains not only the skills, but also the mindset required to be a successful penetration tester.

WHO IS THIS COURSE FOR?
This course is designed for information security professionals who want to take a serious and meaningful step into the world of professional penetration testing. This includes:

  • Pentesters seeking an industry-leading certification
  • Security professionals
  • Network administrators
  • Other technology professionals
COURSE SYLLABUS
PWK is a unique course that combines traditional course materials with hands-on simulations, using a virtual lab environment. The course covers the following topics. View the full syllabus.

  • Penetration Testing: What You Should Know
  • Getting Comfortable with Kali Linux
  • Command Line Fun
  • Practical Tools
  • Bash Scripting
  • Passive Information Gathering
  • Active Information Gathering
  • Vulnerability Scanning
  • Web Application Attacks
  • Introduction to Buffer Overflows
  • Windows Buffer Overflows
  • Linux Buffer Overflows
  • Client-Side Attacks
  • Locating Public Exploits
  • Fixing Exploits
  • File Transfers
  • Antivirus Evasion
  • Privilege Escalation
  • Password Attacks
  • Port Redirection and Tunneling
  • Active Directory Attacks
  • The Metasploit Framework
  • PowerShell Empire
  • Assembling the Pieces: Penetration Test Breakdown
  • Trying Harder: The Labs
COURSE PREREQUISITES
All students are required to have:

  • Solid understanding of TCP/IP networking
  • Reasonable Windows and Linux administration experience
  • Familiarity of Bash scripting with basic Python or Perl a plus
WHAT COMPETENCIES WILL YOU GAIN?
  • Using information gathering techniques to identify and enumerate targets running various operating systems and services
  • Writing basic scripts and tools to aid in the penetration testing process
  • Analyzing, correcting, modifying, cross-compiling, and porting public exploit code
  • Conducting remote, local privilege escalation, and client-side attacks
  • Identifying and exploiting XSS, SQL injection, and file inclusion vulnerabilities in web applications
  • Leveraging tunneling techniques to pivot between networks
  • Creative problem solving and lateral thinking skills
SUPPORTING YOUR ONLINE JOURNEY
  • 17+ hours of video
  • 850-page PDF course guide
  • 75 machines
  • Active student forums
  • Access to virtual lab environment
Author
TUTProfessor
Downloads
113
Views
890
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from TUTProfessor