5 Days


Employees of federal, state and local governments; and businesses working with the government.

Target Audience:

Kali Training is designed to help attendees master the most heavily used exploitation distribution  on the planet and see how they can wield it effectively in professional penetration testing. We analyze some of the most powerful and yet often overlooked capabilities of the Kali distribution with numerous exercises. Both pentesters and IT security professionals are encouraged to attend.


There are no rigid prerequisites, but attendees should have a working knowledge of Linux/Unix and be familiar with networking concepts and protocols.

Course Outline:

1. Penetration Testing Methodology
2. Kali Services
3. Basic BASH scripting
4. Target Scoping
5. Information Gathering
6. Target Discovery
7. Enumerating the Target
8. Vulnerability Mapping
9. Social Engineering
10. Exploit Development
11. Password Cracking
12. Web App Exploitation
13. Target Exploitation
14. Privilege Escalation
15. Maintaining Access