Course curriculum

  • 1

    Setting Up Kali Linux

    • Installing & Updating Kali Linux

    • Configuring Kali Linux

    • Virtualization Essentials

  • 2

    Setting Up BlackArch Linux

    • Installing BlackArch Linux

    • Configuring BlackArch Linux

  • 3

    Reconnaissance With BlackArch Linux

    • Information Gathering & Validation

    • Using Maltego To Gather Information

    • Cherrytree For Information Database Storage

    • Using Nmap For Information Gathering

  • 4

    Penetration Testing

    • Dracnmap Scripts

    • Android Penetration Testing

    • Windows 7 Penetration Testing

    • Netcat Network Penetration Testing

    • BeEF, Browser Injections, & Additional Browser Attacks

    • Facebook Penetration Testing

    • Penetration Testing Wireless Networks

    • Man-In-The-Middle Attacks (MITM)