0
Trainer Name

Jesse Kurrus

Skill Area

Reviews

5 (1 Rating)

Course Requirements

- Basic knowledge of Linux
- VirtualBox
- Modern laptop or PC (8 GB RAM at least)
- Tested on Windows 10, although other OS's will likely work fine
- Passion for cyber security

Course Description

Welcome everyone, and thanks for choosing to participate in my Kali Linux Hands-on Penetration Testing Labs 4.0 course. If you've taken my previous courses with similar names, you already know what's in store. I'll be providing a bunch of vulnerable Virtual Machines which we'll be hacking with Kali Linux using VirutalBox. At the time of this recording, all of the technology is cutting edge, and real-world relevant. Just to give you an idea of what to expect, we'll be focusing very little on theory, and putting a high emphasis on practical hands-on application of offensive security skills.

For example, we're going to be utilizing some of the industry standard penetration testing tools such as nmap, Metasploit, dirb, netcat, Burp suite, and a bunch of custom exploits. We'll be focusing on automated and manual enumeration and exploitation, which is a key essential when training to be a subject matter expert in our field. Some of the attack techniques we'll be covering are remote web application and service exploitation, privilege escalation, directory traversal, SQL injection, local file inclusion, and much more. If you're not quite sure what some or any of these words mean, don't worry, you'll see soon enough their effectiveness in action.

Course Outcomes

What you'll learn
- Penetration Testing
- Kali Linux
- Directory Traversal
- SQL Injection
- Remote/Local Exploitation
- Remote/Local System Enumeration
- Privilege Escalation
- Nmap
- Metasploit
- Dirb

Course Curriculum

1 Introduction


2 Download and Config Vulnerable Attack Target VMs


3 Download and Configure Kali Linux 2020


4 Tr0ll 3 Enumeration and Exploitation


5 Matrix 3 Enumeration and Exploitation


6 Broken Gallery Enumeration and Exploitation


7 DumbUser (Windows 10) Enumeration and Exploitation


8 Symfonos 1 Enumeration and Exploitation


9 Symfonos 2 Enumeration and Exploitation


10 Symfonos 3 Enumeration and Exploitation


11 Symfonos 4 Enumeration and Exploitation


12 Symfonos 5 Enumeration and Exploitation


13 Gigitalworld.local Torment Enumeration and Exploitation


14 Digialworld.local JOY Enumeration and Exploitation


Trainer

Trainer Name

Jesse Kurrus

5 Rating
1 Reviews

More Courses by Author

Learner Feedback

Hands on Penetration Testing Labs 4.0

5

Course Rating
100.00%
0.00%
0.00%
0.00%
0.00%

Log In or Sign Up as learner to post a review

Shopping Cart

Loading...