CBT Nuggets - Penetration Testing with Linux Tools
.MP4, AVC, 500 kbps, 1280x720 | English, AAC, 56 kbps, 2 Ch | 11 hours | 2.58 GB
Instructor: Keith Barker
This course with Keith Barker offers both BackTrack and Kali Linux training, which provides easy access to an extensive collection of security-related tools ranging from port scanners to Security Audit.
Related Area of Expertise:
IT Security
Recommended skills:
Virtualization (VirtualBox or VMware)
Wireshark Packet Capture software
GNS3
Linux
IPv4 and IPv6 networking (Network+, Juniper JNCIA or Cisco CCNA) or similar equivalent experience
Recommended equipment:
Virtualization software such as Virtual Box, or VMware. Dedicated hardware could be used instead of a virtual environment to run BackTrack or Kali Linux. A BackTrack/Kali supported wireless network card would also be needed to practice and use the wireless related tools.
Related certifications:
CEH
CCNA Security
CCNP Security
Check Point CCSA/CCSE
Juniper security certifications
Related job functions:
System, Network, and/or Web Penetration Tester
Security Architect
Network Security Engineer
Security Analyst
Computer Crime Investigator
CISO/ISO or Director of Security
Application Penetration Tester
Intrusion Analyst
Vulnerability Researcher/ Exploit Developer
Security Auditor
Security-savvy Software Developer
BackTrack is a Linux distribution designed by Jason Dennis based on the Ubuntu Linux distribution aimed at digital forensics and penetration testing use. In March 2013, the Offensive Security team rebuilt BackTrack and released it under the name Kali Linux.
Kali Linux is an advanced Penetration Testing and Security Auditing Linux distribution. Kali Linux features a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrastructure has been put in place, all tools were reviewed and packaged.
This Kali Linux course addresses both platforms and focuses on using the tools of BackTrack/Kali Linux for authorized penetration testing and vulnerability analysis for both wired and wireless networks. None of these tools should be used in any unauthorized, unlawful or harmful ways.
More Info
发布日期: 2016-01-25