Mastering Kali/Backtrack Linux

In this course we will cover:

  1. Penetration Testing: Overview
  2. Getting Comfortable with Kali Linux
  3. Essential Tools
  4. Passive Information Gathering
  5. Active Information Gathering
  6. Vulnerability Scanning
  7. Buffer Overflows
  8. Win32 Buffer Overflows
  9. Linux Buffer Overflows
  10. Working with Exploits
  11. File Transfers
  12. Privilege Escalation
  13. Client Side Attacks
  14. Web Application Attacks
  15. Password Attacks
  16. Port Redirection / Tunneling
  17. Metasploit Framework
  18. Bypassing Antivirus Software
  19. Phases of Penetration Testing

Leave Comment

Your email address will not be published. Required fields are marked *

UA-46837009-1