Tags: Kali Linux , Linux , Security , Self-paced , Training
Kali Linux: Auditing, Pentesting, Offensive Security, and Ethical Hacking On-Demand Training
- Brand: Nanfor Iberica
- Availability: In Stock
$1,011.00
This course is taught in online format and consists of 8 units and a final project. The duration of the course is distributes between the content and the collaboration tools. Upon completion, the student will receive a certificate of completion. Course Description This course provides comprehensive and practical training...
Course Description
Target Audience
This course is geared towards:
- Technical profiles that wish to get into pentesting, offensive security and ethical hacking.
- System and network administrators seeking to strengthen the security of their infrastructures.
- SOC analysts, Blue Team members, or IT professionals who want to understand offensive techniques to improve defense.
- Cybersecurity students who require practical experience with professional methodology.
- Candidates starting the path towards security or Linux certifications.
Training Objectives
Upon completion of the training, the student will be able to:
- Use Kali Linux as a professional environment for auditing and penetration testing.
- Applying recognition, scanning, and enumeration techniques to network infrastructures.
- Identify and exploit vulnerabilities in controlled environments.
- Analyze network traffic and detect potential attack vectors.
- Perform basic tests on wireless networks and detect weaknesses.
- Understanding the formal methodology of a professional pentest.
- Perform post-exploitation tasks on Linux systems.
- Prepare professional technical reports, following best practices and standards.
- Act in accordance with the principles of ethical hacking and within the current legal framework
Course Content
Unit 1 – Introduction
- Course presentation and objectives
- Prerequisites (basic Linux, networking)
- What is Kali Linux and what is it used for?
- Installing Kali (VMWare, VirtualBox, LiveUSB)
Unit 2 – Basic Configuration and Tools
- Kali Linux initial setup
- Network interface management and IP configuration
- Essential networking tools: `ifconfig`, `ip`, `netstat`, `ss`, `nmap`, `tcpdump`, `wireshark`
- Repositories and system updates
Unit 3 – Network Scanning and Discovery
- Passive vs. active recognition
- Advanced use of `nmap` (NSE scripts, custom scans)
- Discovery of devices, services, and ports
- Fingerprinting of operating systems and services
Unit 4 – Traffic Analysis
- Capture and analysis with `Wireshark`
- TCP session filters and tracking
- Sniffing techniques with `tcpdump`, `ettercap`
- Protocol analysis: HTTP, DNS, SMB, FTP
Unit 5 – Attacks on networks and services
- Introduction to MITM (Man-in-the-middle)
- ARP Spoofing and DNS Spoofing
- Credential capture and traffic manipulation
- Attacks on common services: SSH, FTP, Telnet, HTTP
Unit 6 – Exploitation of vulnerabilities
- Scanning with `Nikto`, `OpenVAS`, `Metasploit`
- Recognition of vulnerabilities in services
- Exploiting insecure services with `Metasploit`
- Generation of payloads and reverse shells
Unit 7 – Wireless Security
- WiFi network monitoring and scanning
- Cracking WPA/WPA2 keys with `aircrack-ng`
- Deauthentication attacks
- Handshake capture
Unit 8 – Reports and best practices
- How to document findings
- Generating technical reports with tools like `Dradis`
- Professional ethics and legality of evidence
- Defensive measures following an audit
- Assessment and practices
- Practical laboratories in each unit
- Access to simulated networks or TryHackMe-type platforms
Final project: Complete audit of a simulated network
Prerequisites
To fully benefit from this course, it is recommended that the participant have:
- Interest in cybersecurity and the operation of computer systems.
- Analytical attitude, investigative curiosity, and problem-solving skills.
- Basic understanding of the general workings of the Internet and systems, even without in-depth knowledge.
- Ethical commitment, understanding the importance of using the techniques learned only in authorized environments.
- Eagerness to learn in a practical way through laboratories and exercises with simulated environments (TryHackMe, vulnerable machines, etc.).
Note: Prior experience in pentesting or using Kali Linux before is not required; the course is designed to guide the student from the fundamentals.
Course is available in English.
Student Access: 8 weeks