Kali Linux Table of Contents


Table of Content
 

 

Ethical Hacking Basics

  • Penetration Testing
  • White Box vs Black Box Versus Gray Box
  • Vulnerability Assessment vs Penetration Testing
  • Ethical Hacker Responsibilities and Customer Expectations
  • Laws and Legal Obligations

Ethical Hacking Process

  • Preparation Steps for Penetration Testing
  • First Step of Penetration Testing – Reconnaissance
  • Scanning, Enumeration, and Fingerprinting
  • Vulnerability Assessment
  • Exploitation and Access
  • Reporting

Kali Linux Test Lab

  • Test Lab Requirements
  • Diagram and Design
  • Test Connectivity

Kali Linux Reconnaissance

  • Passive Reconnaissance
  • Active Reconnaissance
  • Dmitry
  • Maltego

Kali Linux and Scanning

  • TCP, UDP and, ICMP Scanning
  • Nmap – ICMP Scan
  • Nmap – TCP Scan
  • Nmap – Advanced TCP Scans
  • Nmap – UDP Scan
  • OS Detection
  • Avoid Detection
  • Nmap – Scripts and Script Engine
  • Nmap Troubleshooting

Kali Linux Vulnerability Scanning and Exploitation

  • Nikto
  • Sparta
  • Ettercap
  • Metasploit
  • Armitage

Kali Linux Exploitation and Backdoors

  • Spear Phishing Attacks
  • Credential Harvesting with Website Cloning
  • Netcat
  • John the Ripper


Apply for certification

https://www.vskills.in/certification/security/kali-linux

 For Support