Kali Linux Penetration Test Training

Kali Linux Penetration Test Training Kali Linux Penetration Test Training
By TED Integrated
System Security:

Penetration Testing with Kali™ Linux

“Learn the proven Kali Linux Penetration Test methodology.”

By TED Integrated

PSMB Certified Training Provider
Request for In-house TrainingRequest for In-house Training
Register for Public Training Public program not yet available
Email Customer Service training@ted.com.my Contact Customer Service +603-2386-7788
Course Title:
Penetration Testing with Kali Linux
Training Category:
Information Technology
Target Audience:
IT Administrator, System Engineers, Webmasters, CTOs, CIOs, IT heads and managers who want to know more about Kali Linux penetration test.
2 Days
For In-house Training
Request for Quotation Request for Quotation
For Other Inquiries
Contact TED Integrated
Contact customer service +603-2386-7788
Email customer service training@ted.com.my
Delivery Methods
  • Language: English
  • PowerPoint Presentation
  • Group Discussion
  • Presentation Handouts
  • Computer Lab Work
  • Certificate of Participation
*Terms & Conditions
Ad by Google

Course Introduction ›

This is a 2-Day Kali Linux Penetration Test training for IT professionals who involve and responsible in cyber security aspects of their organization. Participants will learn to understand the network system vulnerabilities in their organization and apply proven Kali Linux Penetration Testing Methodlogies to mitigate the problems before they turn into disasters.

To request for in-house training, click on the Request for In-house Training link as displayed above for quotation. For a complete course cotent and more information about this course, feel free to contact the training provider as shown above. If the public program is available, you can request for a registration online by clicking on the Register for Public Training link. If the link is disabled, it simply means it has yet to be available for public. You can contact the training provider for further inquiry.

Course Objectives ›

At the end of this workshop, participant should be able to understand the following:

  • What is Penetration Testing and Kali Linux
  • Pentest Lab Setup in Kali Linux
  • Network Services in Kali Linux
  • Scanning
  • Harvesting
  • Injection
  • Backtrack 5 & Kali Linux

Course Outline ›


Penetration Testing

  • What is Penetration testing
  • What is backtrack 5 & Kali Linux
  • Penetration testing scope
  • Pentester Strategies

Pentest Lab Setup

  • Lab setup in Real Life
  • Backtrack 5 & Kali Linux Installation & Configuration
  • Vulnerable Linux configuration
  • Linux basic usage

Network Services

  • SSH service in Kali Linux
  • Apache service in Kali Linux
  • Mysql service in Kali Linux
  • Dradis service in Kali Linux
  • Networking service in Kali Linux
  • MAC changer in Kali Linux


  • Scripting for automation
  • Port scanner in python
  • Port scanner in ruby
  • Nmap usage
  • Zenmap usage
  • Netcat in Kali Linux


  • Google advance Search
  • Harvesting Emails
  • Whois search
  • Knowing about phishing
  • Advance phishing a.k.a. DNS poisoning
  • SSL man in the middle attacks


  • Installing Custom Setup
  • Impact of low sanitization
  • Cross site scripting reflected
  • Cross site scripting Stored
  • SQL injection
  • Cross site request attacks


  • MSFCLI in metasploit in Kali
  • Msfconsole in Backtrack 5 & Kali Linux
  • Armitage in Backtrack 5 & Kali Linux
  • Social Engineering toolkit

Contact us now ›

  • Course content customization
  • In-house training request
  • Available public program
  • Consultation services
  • Other inquiries
Contact Customer ServiceCall : +603-2386-7788
Email Customer Service E-mail : training@ted.com.my

Related Courses ›

Published by: ,
online learning icon Request for Online Training
Contact Us
Animated Progress Icon

Contact Assistant