Penetration Testing with Linux Tools Online Training

    Taught by
    UPDATED: March 14, 2013
    Intermediate

    This penetration testing training prepares learners to use Kali Linux for penetration testing and vulnerability analysis. Discover essential tools like Backtrack, uncover hidden SSIDs, and execute spoofing attacks. Designed for IT professionals with networking or programming experience, this Linux training prepares you to perform authorized penetration tests on wired and wireless networks, advancing your skills toward becoming a penetration tester.

    Start a free week

    Subscription options

    $59.00

    Access all premium content with a free week!

    • Quizzes
    • CyberVista® IT practice exams
    • Coaching
    • IT learner community
    Start a free week
    G2 Logo
    4.5 reviews stars

    What you'll learn

    • Kali Linux
    • Installing and using Backtrack
    • Uncovering hidden SSIDs
    • Rogue wireless access points
    • DNS and other spoofing attacks
    • Detecting rootkits

    FAQs

    What will you learn in this penetration testing course?

    You'll learn advanced methods for poking and prodding at a network's security infrastructure until you can finally intrude into a network and see its data laid out before you, all so that you have a better understanding of how to protect and safeguard your own networks.

    Who should take this course in Linux penetration testing?

    Cybersecurity professionals should have several years of experience before taking this course in Linux penetration testing and Kali Linux penetration test tools. Pentesting is challenging and complicated work, and new or inexperienced cybersecurity professionals will probably struggle with some of the more advanced concepts and tools.

    Is this penetration test course associated with any certifications?

    No, this course isn't designed to help you pass any certification exam. This course was designed to give you hands-on experience with some of the most powerful Linux and Kali tools available for running penetration tests. You'll be ready to do pentests after this course, not just answer questions.

    What certification should you consider after taking this penetration testing course?

    Although this course doesn't prepare you for any particular certification, you might consider the CompTIA PenTest+ after taking it. You'll want to go on to do more specific training before attempting the exam, but this course will get you started with some of what you can expect on that exam.

    Why should you take this course in using Linux tools in penetration testing?

    You should take this course so that the powerful tools that Linux and Kali have for breaking into networks aren't as dangerous when they're deployed against you and your network. You can also help advance your career and take on more interesting work with this course.

    Who is this for?

    This penetration testing skills course is designed for systems administrators with three to five years of experience with open source platforms.

    target-audience-face-9target-audience-face-5target-audience-face-3

    What our learners say

    • I didn't ever think I'd have the position I have now.

      Jenna B. | Service Operations Manager
    • You constantly have to invest in training for your people.

      Rick N. | CEO
    • It feels like the best and the brightest people are training with you — and they are just hanging out with you and showing you the ropes.

      John McCann | IT manager and CBT Nuggets learner
    Study plan

    Download the free Penetration Testing with Linux Tools Online Training study plan to complete this course in about 12 hours.

    Download study plan

    Related Topics

    Get CBT Nuggets IT training news and resources

    I have read and understood the privacy policy and am able to consent to it.

    © 2024 CBT Nuggets. All rights reserved.Terms | Privacy Policy | Accessibility | Sitemap | 2850 Crescent Avenue, Eugene, OR 97408 | 541-284-5522