IT Security Gumbo: Exploitation with Kali
Hands On Penetration Testing with Kali Linux
IT and Software ,Network and Security,Cyber Security
Lectures -9
Duration -1 hours
Lifetime Access
Lifetime Access
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
IT Security Gumbo: Exploitation with Kali
This course consists of 100% hands-on technical labs, utilizing Kali Linux to hack a variety of intentionally vulnerable operating systems. All of the resources to build the labs are free. Detailed instructions on how to set up the labs are included within this course. To make the most out of this course, it is recommended that you actually perform the activities within the labs rather than just watch the videos.
1. Exploiting Services
- Samba Exploit
- IRC Exploit
- Java RMI Exploit
2. Exploiting Shellshock
- Using MSF
- Using HTTP
- Using BadBash
3. Exploiting Privilege Escalation
- Kernel Exploit
- Empire and Setoolkit
Who this course is for?
- Cybersecurity Students
- Cybersecurity Professionals
- CEH Candidates
Goals
- Perform remote exploitation of systems.
- Escalate local privileges to root level.
- Utilize a variety of industry-standard penetration testing tools within the Kali Linux distro.
Prerequisites
- Basic Linux knowledge.
- Basic networking knowledge.
- VirtualBox.
- Windows 7 VM.
- Desktop or Laptop with a minimum of 2GB RAM.

Curriculum
Check out the detailed breakdown of what’s inside the course
Exploiting Services
3 Lectures
-
Samba Exploit 07:00 07:00
-
IRC Exploit 07:02 07:02
-
Java RMI Exploit 10:28 10:28
Exploiting Shell Shock
3 Lectures

Exploiting Privilege Escalation
2 Lectures

Instructor Details

Corey Charles
Corey Charles is Security+, Qualys Vulnerability Management Specialist Certified. Mr. Charles has 11 years experience in IT Security with a direct focus in Vulnerability Management. Mr. Charles also taught on the collegiate level, teaching IT Security at Herzing University.
Mr. Charles also holds two Bachelors of Arts Degrees, Digital Design and Media Arts, one Associates, Digital Design from Tulane University. Two Master Degrees from Strayer University, Master of Science in Computer
Security Management and Master of Science in Computer Forensics Management. He holds an Executive Graduate Certification in Computer Networking.
Course Certificate
Use your certificate to make a career change or to advance in your current career.

Our students work
with the Best


































Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now