Press esc to close
Press esc to close
Fill out your contact details below and our training experts will be in touch.
If you wish to make any changes to your course, please log a ticket and choose the category ‘booking change’
Back to Course Information
Looking for Vulnerabilities
Attacking Using Vulnerabilities
The course is aimed at anybody looking for a good overall understanding of penetration testing and the tools and techniques it encompasses. It will be particularly beneficial for IT professionals with some security knowledge.
You should meet the following prerequisites:
This 2-day course provides a comprehensive look at the main tools and techniques for testing network security using penetration testing. Through hands-on experience, you’ll learn about basic attack strategies and how to uncover critical vulnerabilities using ethical hacking.
The course is aimed primarily at software testers, including automation engineers and test managers.
There are no prerequisites to attend.
This 1-day course provides a comprehensive introduction to test automation for anybody wishing to become familiar with the concept. Through instructor-led classroom training, you will become familiar with the principles of test automation, including approaches, benefits and tools.
Getting Started with Kali Linux
Information Gathering and Vulnerability Analysis Tools
Kali Linux Wireless Attacks
Website Penetration Testing
Website Penetration and Exploitation Testing
Kali Linux Social Engineering
Sniffing and Spoofing
Password Cracking Tools
Overview of Reverse Engineering
Kali Linux Reporting Tools
There are no formal prerequisites for attending this course. However, a basic understanding of the Linux operating system would be beneficial.
Anyone who wishes to gain knowledge of the fundamentals of Kali Linux can attend this course.
Kali Linux is a Debian-based Linux distribution OS used for penetration testing and security auditing. It is comprised of various tools used for several information security tasks such as computer forensics, reverse engineering, security research, and penetration testing. This Kali Linux Fundamentals course is designed to provide you with a complete understanding of Kali Linux and how to use it in practice.
In this 1-day training course, delegates will be introduced to the various tools of Kali Linux. Delegates will get an in-depth view of working with Kali Linux for strengthening network security. In addition, delegates will gain knowledge of wireless attacks, website penetration testing, and social engineering.
During this Kali Linux Fundamentals course, delegates will learn about stressing tools and password cracking tools. Throughout the course, delegates will come across several topics which will develop your knowledge about Kali Linux. Delegates will get an understanding of sniffing and spoofing as well as reverse engineering. After completing this course, you will be at moderate level expertise from where you can take yourself to the next levels.
Speak to a training expert for advice if you are unsure of what course is right for you. Give us a call on +1 6474932992 or Inquire.
Course was run very smoothly, Richard our trainer was extremely knowledgeable and delivered the course in a succinct fashion with a twist of humour thrown in.
The course was great and the so was the trainer - brilliantly delivered and I would certainly recommend this course to my colleagues. Thanks to Richard for a great course and delivering it a tough environment virtually.
Richard was very knowledgeable and explained well
You won't find better value in the marketplace. If you do find a lower price, we will beat it.
We are accredited by PeopleCert on behalf of AXELOS
Flexible delivery methods are available depending on your learning style.
Resources are included for a comprehensive learning experience.
"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"
Joshua Davies, Thames Water