- Course info
- Course resources
In this intermediate Linux skills training, Keith Barker prepares you to use Kali Linux to perform penetration testing.
Two words of warning about this Kali Linux training. First, Kali Linux may have hundreds of tools pre-installed, but you still need to know how to use them. In this penetration testing training, Keith provides a thorough review of the most commonly used Kali Linux tools, but you still need an underlying knowledge of applications, networks, and hardware to make them work. The best pen testers draw on their previous experience as programmers or networking professionals.
Second, these are powerful tools — and shouldn’t be used in any unauthorized, unlawful, or harmful way.
After completing this Penetration Testing with Linux Tools training, you'll know how to use Kali Linux tools for authorized penetration testing and vulnerability analysis of both wired and wireless networks. With at least three to five years of previous technical experience, IT professionals who complete this Kali Linux training will be closer to becoming a penetration tester.
For anyone who manages security training, this Kali training can be used to upskill network administrators or developers to pen testers, curated into individual or team training plans, or as a reference resource.
Penetration Testing with Linux Tools: What You Need to Know
For any systems administrator looking to improve their proficiency with open source platforms, this Linux course covers topics such as:
- Kali Linux
- Installing and using Backtrack
- Uncovering hidden SSIDs
- Rogue wireless access points
- DNS and other spoofing attacks
- Detecting rootkits
Who Should Take Penetration Testing with Linux Tools Training?
This penetration testing skills course is designed for systems administrators with three to five years of experience with open source platforms.
Experienced IT professionals. If you’ve already spent several years in systems administration or information security and you’re looking to move into “white hat” hacking, this training is where to start. The training is entry-level security training but rests on intermediate networking knowledge, so it depends on some level of pre-existing familiarity with systems and networks. With this Penetration Testing with Linux Tools training, you’ll be equipped to set-up your networks so they’re safe as well as perform penetration testing to check them.