Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
Python in Depth
- Strings and expressions
- Functions and conditionals
- Variables and lists
Penetration Testing
- What is penetration testing?
- The five phases of penetration testing
Overview of Kali Linux
- Kali deployments
- Exploit methods
- The Kali menu and toolbox
Preparing the Development Environment
- Installing a virtual machine
- Installing and configuring Kali Linux
- Installing and configuring Python Kali Linux
- Setting up a Box Lab
System Shells
- Using Weevely
- Generating shellcode with MSFvenom
- Injecting images with jhead
- Using shellcode in exploits
Python and Kali Linux
- Creating a penetration program with Python
- Working with TCP Client and TCP Service
- Using raw binary packets
- Port scanning with NMAP
Mapping
- Applying sniffing methods
- Using SQL injection: offensive and defensive
- Implementing brute force methods
Metasploitable
- Targeting Metasploitable
- Exploiting the distribute compile system
- Exploiting network files
- Achieving root
End-to-End Testing
- Exploiting with EternalBlue
- Using Devel exploits
- Using Kronos exploits
Summary and Conclusion
Requirements
- An understanding of network vulnerabilities
Audience
- Penetration Testers
- Security Engineers
- Ethical Hackers
14 Hours
Testimonials (2)
Hands-on exercises related to content really helps to understand more about each topic. Also, style of start class with lecture and continue with hands-on exercise is good and helpful to relate with the lecture that presented earlier.
Nazeera Mohamad - Ministry of Science, Technology and Innovation
Course - Introduction to Data Science and AI using Python
It was very much what we asked for—and quite a balanced amount of content and exercises that covered the different profiles of the engineers in the company who participated.