Kali 101

Provided by

About the course

This two day Kali 101 course delivers individual modules, as described below:

  • The purpose of the Kali Linux distribution
  • The various ways in which Kali Linux can be loaded on to a system
  • Build a bootable Kali USB (to take away after the course)
  • The capabilities and limitations of Kali Linux
  • The different types of tools contained within Kali Linux
  • The negative effects which can be caused by tools within Kali Linux
  • The ways in which negative effects can be managed and mitigated
  • The prerequisites needed to conduct thorough testing using Kali Linux
  • How to use the different tools within Kali Linux, including:
    • Network Mapper (NMAP)
    • DNS Enumeration (dnsenum)
    • Metasploit (exploit framework)
    • Zed Attack Proxy (ZAP)
    • Burp Suite (Interception proxy)
    • Responder (MITM)
    • Fimap (LFI/RFI)
    • SQL injection tools (sqlmap)
Outline

Module 1: Introduction to Kali Linux

This module helps delegates understand the purpose, capabilities and limitations of Kali Linux and how some of the tools contained within Kali Linux can cause negative side effects on the network and how these negative effects can be managed and mitigated

This module covers the following subjects:

  • The purpose of Kali Linux
  • The ways in which Kali Linux can be loaded on to a system
  • The capabilities and limitations of Kali Linux
  • The negative side effects of Kali Linux and how to manage them
  • The prerequisites needed to conduct thorough testing using Kali Linux

Module 2: Kali Linux tools and techniques

This module covers the various different tools contained within Kali Linux and how they can be maintained, managed and configured to ensure that testing is as thorough and efficient as possible.

This module covers the following subjects:

  • The various types of tools contained within Kali Linux
  • How to maintain and configure tools within Kali Linux
  • How to use tools within Kali Linux
  • How to manage time while conducting tests

Related article

A concerning chuck of National Health Service trusts in England and Wales lack sufficient in-house cyber security expertise, new research has revea...