Course archive

The courses below were all published in 2015 or earlier. While we stand by pubishing them then, we’ve grown so much since. We recognize that these workshops don’t exactly meet our standards, as we understand them today. 

All classes are available within our premium membership, and have adjusted CPE awards to reflect their respective contents. If you join, please keep in mind that some of the information inside might be outdated or not relevant. We’ll be adding notes at the beginning of each course to let you know what’s worth checking out in each! 


The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription


This online course is for you and you will learn how to build your own virtual lab and install the pre-requisites. You will also build your Own Kali Linux customize build with Nessus as Vulnerability Scanner. You should be using your new build of Kali Linux for attacking the vulnerable machine in this workshop.

The idea behind this workshop is basically nothing new but we will learn something new that’s the whole agenda. The workshop would be simple and will go quickly. Do not feel that I will explain how certain tools works or what is exploit blah blah. However a bit of them!

You will gain the new SUPER SKILL you will know how to create your own Virtual Lab to hack what you need or want to HACK!

We will be focusing on how to do some research on actually discovering vulnerabilities in software and then putting more efforts to write some proof of concepts for those vulnerabilities. The value added of this workshop would be a quick guide on how to rebuild Kali Linux as per your requirement. As we have listed down “Nessus” to be used in this workshop for the vulnerability assessment phase, what if you can rebuild Kali Linux and add some security tools in it, which you always wanted. Kali Linux is customizable and we will add Nessus in our new build of Kali Linux.

Certificate of completion, no CPE credits


Pre-requisites

  • A vulnerable program
  • Programming concepts
  • Expertise in any one programming language (python preferred)
  • Knowledge on vulnerability assessment tools

Course format

  • The course is self-paced – you can visit the training whenever you want and your content will be there.
  • Once you’re in, you keep access forever, even when you finish the course. 
  • There are no deadlines, except for the ones you set for yourself. 

INSTRUCTOR Raheel Ahmad (RA) is an information security professional with in depth experience in Ethical Hacking & Penetration Testing. He has performed many penetration testing engagements for well known top ten Banks and enterprises while working for Big4 and other consulting firms. He is Bachelors in Computer Engineering and hold almost decade of experience in Information Security across multiple countries. Best way to reach out RA is via hakin9 messages for any question regarding the workshops.


QUESTIONS? 

If you have any questions, please contact our eLearning Manager at [email protected].

Course Reviews

1.5

1.5
2 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars1
  • 1 stars1
  1. Lacking actual Training

    1

    Most of the course talks about what to use and little on how or what to test. I had to find other sites only to find full step on how to build my own Kali because the course was lacking instruction and troubleshooting skills. There was no test or projects to practice what was trying to convey on this course.

  2. A little bit more

    2

    Some text was not complete and a help text was written but it could not be send.
    I can not watch any video in this course, that was bad.

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.