Course archive
The courses below were all published in 2015 or earlier. While we stand by pubishing them then, we’ve grown so much since. We recognize that these workshops don’t exactly meet our standards, as we understand them today.
All classes are available within our premium membership, and have adjusted CPE awards to reflect their respective contents. If you join, please keep in mind that some of the information inside might be outdated or not relevant. We’ll be adding notes at the beginning of each course to let you know what’s worth checking out in each!
The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription
You will learn how to install Nessus Vulnerability Scanner on Kali Linux and how to do penetration tests with Kali Linux.
Certificate of completion, 1 CPE credit
Course format
- The course is self-paced – you can visit the training whenever you want and your content will be there.
- Once you’re in, you keep access forever, even when you finish the course.
- There are no deadlines, except for the ones you set for yourself.
SYLLABUS
MODULE 1: SETTING UP YOUR VIRTUAL ENVIRONMENT
- Building the Virtual Hacking Environment
Victim Machine (Microsoft Windows) (Metasploitable) (kioptrix)
Kioptrix Hacking Challenges
OS for Web for Pen testers
DVWA
MODULE 2: KALI LINUX AND ETHICAL HACKING
Knowledge Base
Phases of Ethical Hacking
Lab Tasks
Exploiting Windows Machine to gain Shell Access
MODULE 3: KALI LINUX AND EXPLOIT DEVELOPMENT
Kali Linux Exploit Development Support
Kali and Metasploit
Fuzzing and Kali Linux
Kali Linux & EIP Offset
Kali and Shellcode
MODULE 4: TOP 10 SECURITY TOOLS IN KALI LINUX
- Overview: Airckack, Burp Suite, Hydra, John the Ripper, Maltego, Metasploit Network, NMAP, OWASP ZAP, SQLmap, Wireshark
MODULE 5: KNOWN HACKING DISTRIBUTIONS (OPERATING SYSTEMS) OVERVIEW:
- Blackbuntu
- NodeZero Linux
- BackBox
- Samurai WebTesting Framework
- STD Linux
MODULE 6
- Workshop eBook
FINAL QUIZ
QUESTIONS?
If you have any questions, please contact our eLearning Manager at [email protected].
Aniket Chhoker
This is very informative course for me. i learned a lot from this.
Easy Hacking With Security Tools
Good read for beginners
Easy Hacking With Security Tools (W10)
Great workshop for beginners.
Easy Hacking With Security Tools (W10)
Suitable course for begginers. most of content can be practiced and mastered straight forwad in few time. for me it was one day working.
Thank you
Easy Hacking With Security Tools (W10)
Good course for a beginner
Great workshop
Great workshop for beginners.
According to my personal opinion should be placed other examples to explain certain concepts.
Good fundamentals, needs more examples and details
I took a look at this and thought it was good fundamental starter to using tools. Concepts should be reviewed or referenced a little more and particularly with the exploit dev side, placement ideas of shell code and better diagrams of EBP vs. ESP should be utilize. Readers who aren’t as familiar with x86 intel architecture may not realize the ESP is usually set from EBP first and preserved as a marker for the next PEB frame. Supplemental material, such as the this site may explain and help more to some readers: https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/