Course Outline
Introduction
Python in Depth
- Strings and Expressions
- Functions and Conditionals
- Variables and Lists
Penetration Testing
- Definition of Penetration Testing
- The Five Phases of Penetration Testing
Overview of Kali Linux
- Kali Deployments for Government Use
- Exploit Methods in Kali Linux
- The Kali Menu and Toolbox
Preparing the Development Environment
- Installing a Virtual Machine for Government Purposes
- Installing and Configuring Kali Linux for Government Use
- Installing and Configuring Python in Kali Linux for Government Applications
- Setting Up a Box Lab for Government Testing
System Shells
- Using Weevely for Government Penetration Testing
- Generating Shellcode with MSFvenom for Government Use
- Injecting Images with jhead for Government Applications
- Utilizing Shellcode in Exploits for Government Security Assessments
Python and Kali Linux
- Creating a Penetration Program with Python for Government Use
- Working with TCP Client and TCP Service in Government Environments
- Using Raw Binary Packets for Government Testing
- Port Scanning with NMAP for Government Security Assessments
Mapping
- Applying Sniffing Methods for Government Use
- Using SQL Injection: Offensive and Defensive Techniques for Government Applications
- Implementing Brute Force Methods in Government Environments
Metasploitable
- Targeting Metasploitable for Government Penetration Testing
- Exploiting the Distributed Compile System for Government Use
- Exploiting Network Files for Government Security Assessments
- Achieving Root Access in Government Environments
End-to-End Testing
- Exploiting with EternalBlue for Government Purposes
- Using Devel Exploits for Government Testing
- Utilizing Kronos Exploits for Government Security Assessments
Summary and Conclusion
Requirements
- An understanding of network vulnerabilities for government systems
Audience
- Penetration Testers
- Security Engineers
- Ethical Hackers
Testimonials (5)
he was patience and understood that we fall behind
Albertina - REGNOLOGY ROMANIA S.R.L.
Course - Deploying Kubernetes Applications with Helm
OC is new to us and we learnt alot and the labs were excellent
sharkey dollie
Course - OpenShift 4 for Administrators
let me know more Veeam skill
Joe Leung - HA
Course - Veeam Backup and Replication
Everything. It was very understandable, and if we didn't understand something, Adriano explained it.
Zsolt Nagy - W.UP Kft
Course - OpenShift Container Platform for Developers
I mostly enjoyed the knowledge of the trainer.