Penetration Testing with Linux Tools [CBT Nuggets]

Penetration Testing with Linux Tools [CBT Nuggets]
Penetration Testing with Linux Tools [CBT Nuggets] with Keith Barker
MP4, h264, 1280x720 | English, AAC, 2 Ch | 2.59GB

This course with Keith Barker offers training on BackTrack and Kali Linux, which provides easy access to an extensive collection of security-related tools ranging from port scanners to Security Audit.

Related Area of Expertise:

  • IT Security

Recommended skills:

  • Virtualization (VirtualBox or VMware)
  • Wireshark Packet Capture software
  • GNS3
  • Linux
  • IPv4 and IPv6 networking (Network+, Juniper JNCIA or Cisco CCNA) or similar equivalent experience

Recommended equipment:

  • Virtualization software such as Virtual Box, or VMware. Dedicated hardware could be used instead of a virtual environment to run BackTrack or Kali Linux. A BackTrack/Kali supported wireless network card would also be needed to practice and use the wireless related tools.

Related certifications:

  • CEH
  • CCNA Security
  • CCNP Security
  • Check Point CCSA/CCSE
  • Juniper security certifications

Related job functions:

  • System, Network, and/or Web Penetration Tester
  • Security Architect
  • Network Security Engineer
  • Security Analyst
  • Computer Crime Investigator
  • CISO/ISO or Director of Security
  • Application Penetration Tester
  • Intrusion Analyst
  • Vulnerability Researcher/ Exploit Developer
  • Security Auditor
  • Security-savvy Software Developer

BackTrack is a Linux distribution designed by Jason Dennis based on the Ubuntu Linux distribution aimed at digital forensics and penetration testing use. In March 2013, the Offensive Security team rebuilt BackTrack and released it under the name Kali Linux.

Kali Linux is an advanced Penetration Testing and Security Auditing Linux distribution. Kali Linux Features a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrastructure has been put in place, all tools were reviewed and packaged.

This course addresses both platforms and focuses on using the tools of BackTrack/Kali Linux for authorized penetration testing and vulnerability analysis for both wired and wireless networks. None of these tools should be used in any unauthorized, unlawful or harmful ways.