Professional Documents
Culture Documents
Course Syllabus
Course Description: This course covers how to attack from the web using cross-site scripting,
SQL injection attacks, remote and local file inclusion and how to understand the defender of the
network you're breaking into to. You will also learn tricks for exploiting a network.
Prerequisites:
Study Resources:
Slides
Notes
Course Goals: By the end of this course, students should be able to:
❏ Gain a solid understanding of information gathering techniques using built-in tools in Kali
❏ Assess and discover vulnerabilities using automated and manual methods
❏ Capture and analyze network traffic using a variety of tools
❏ Launch different password attacks on your targets
❏ User social engineering and client-side attacks.
❏ Be familiar with post exploitation techniques
❏ Understand perform web application penetration testing techniques like SQL injection,
file inclusion, and XSS
❏ Gain a background on the exciting world of exploit development
❏ Use the Smartphone Pentest Framework to hack mobile devices
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
2
Course Outline
Module 1 | Linux
Lesson 1.1: Linux (part 1) (00:49)
Lesson 1.2: Linux (part 2) Kali Linux Commands (13:58)
Lesson 1.3: Linux (part 3) - Directories, myfile and Nano (13:10)
Lesson 1.4: Linux (part 4) chmod, manipulation and packages (14:40)
Lesson 1.5: Linux (part 5) IP Addressing and netcat (15:40)
Lesson 1.6: Linux (part 6) Copy Commands and crontab (05:26)
Module 2 | Programming
Lesson 2.1: Programming (part 1) Fundamentals for Pen Testers (00:51)
Lesson 2.2: Programming (part 2) Bash Scripting and If/Then Command (10:02)
Lesson 2.3: Programming (part 3) Network Pings (09:26)
Lesson 2.4: Programming (part 4) Python for Port Scanning (13:16)
Lesson 2.5: Programming (part 5) Python Import Command (11:10)
Module 3 | Metasploit
Lesson 3.1: Metasploit (part 1) Introduction (00:59)
Lesson 3.2: Metasploit (part 2) Fundamentals (14:47)
Lesson 3.3: Metasploit (part 3) Operation (24:17)
Lesson 3.4: Metasploit (part 4) Auxiliary Module (05:27)
Lesson 3.5: Metasploit (part 5) msfcli (09:40)
Lesson 3.6: Metasploit (part 6) msfvenom (14:40)
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
3
Module 7 | Exploitation
Lesson 7.1: Exploitation (part 1) Direct Exploitation (16:34)
Lesson 7.2: Exploitation (part 2) SQL Commands (14:26)
Lesson 7.3: Exploitation (part 3) Directory Traversal (06:49)
Lesson 7.4: Exploitation (part 4) Open Source Vulnerability (06:30)
Lesson 7.5: Exploitation (part 5) Using Backdoor to Access an FTP Server (06:18)
Lesson 7.6: Exploitation (part 6) Attaching to an IP Address (06:07)
Module 8 | Passwords
Lesson 8.1: Passwords (part 1) Password Attacks (12:11)
Lesson 8.2: Passwords (part 2) Online Password Cracking (05:28)
Lesson 8.3: Passwords (part 3) Offline Password Attacks (12:25)
Lesson 8.4: Passwords (part 4) Using oclhashcat (17:28)
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
4
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
5
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
6