Kali (PWK) Live
Are you ready to Try Harder?
Penetration Testing with Kali Linux (PWK) is the industry standard for practical, hands-on, information security training. This online ethical hacking course is self-paced which is created and taught by the creators of Kali Linux, the course is designed to provide the knowledge that you need for a career in penetration testing as you learn how to conduct network security assessments and secure your network against cyber attacks. Guiding you from the basics of automation of standard security tasks all the way to discovering, fuzzing and writing your own buffer overflow, this course provides you with not just more """"tool usage"""" instruction. Instead, it comes with all kinds of information for cyber security professionals and details the underlying concepts of what you need to know for a successful career in penetration testing.
- Using information gathering techniques to identify and enumerate targets running various operating systems and services
- Writing basic scripts and tools to aid in the penetration testing process
- Analyzing, correcting, modifying, cross-compiling, and porting public exploit code
- Conducting remote, local privilege escalation, and client-side attacks
- Identifying and exploiting XSS, SQL injection, and file inclusion vulnerabilities in web applications
- Leveraging tunneling techniques to pivot between networks
- Creative problem solving and lateral thinking skills
This is a highly technical course, created for true security professionals. Students with entry level hacking certifications that are in need of modern, practical, real-world penetration testing experience are ideal candidates for this course. Students with limited knowledge that are hungry to succeed and ready to put in extra effort may also find the course perfect.
- Students need to be comfortable in Linux. We'll be using Kali during the entire course as the attacking platform. Navigating through directories, executing scripts and tools and writing basic bash scripts are skills expected from all students.
- A solid understanding of TCP/IP and various network services (DNS, DHCP, etc.).
- Knowledge of a scripting language (Perl, Python, Ruby) is recommended, but not required.
- A solid understanding of information security verbiage and concepts is required.
- Students are required to bring their own laptops with a minimum 8 GB RAM installed. • Students should have administrative access to the host operating system • VMware Workstation / Fusion installed.
- At least 60 GB HD free
- Wired Network Support
- USB 2 or higher support
- A reasonable sized display is highly recommended
- Students should use the VM recommended here: https://help.offensive-security.com/hc/en-us/articles/360049796792
Students will be provided with virtual machines for use in class. Additionally, the Penetration Testing with Kali Linux lab guide will be provided. An in-class ""Hint System"" will provide electronic distribution of all scripts, POCs, and so on. ***PLEASE NOTE*** @Hack does not include the online course materials, exam, lab.
Subject matter experts from Offensive Security