Are you ready to Try Harder?
Penetration Testing with Kali Linux (PWK) is the industry standard for practical, hands-on, information security training. Created and taught by the creators of Kali Linux, this course is designed to provide the knowledge that you need for a career in penetration testing. Guiding you from the basics of automation of standard security tasks all the way to discovering, fuzzing and writing your own buffer overflow, this course provides you with not just more "tool usage" instruction. Instead, it details the underlying concepts of what you need to know to for a successful career in penetration testing.
Topics covered in this course include:
Each module is supported by a real-world lab simulation that provides students with hands on exercises - allowing students to get actual experience in encountering and overcoming the difficulties that surface in real-life penetration tests. Far from canned examples, students are placed in situations in which they have to solve real problems.
Join us and see what has earned Penetration Testing with Kali the reputation it has. Are you ready to "Try Harder"? If so, welcome to Offensive Security.
This is a highly technical course, created for true security professionals. Students with entry level hacking certifications that are in need of modern, practical, real-world penetration testing experience are ideal candidates for this course. Students with limited knowledge that are hungry to succeed and ready to put in extra effort may also find the course perfect.
Students are required to bring their own laptops with a minimum 8 GB RAM installed.
Students will be provided with virtual machines for use in class. Additionally, the Penetration Testing with Kali Linux lab guide will be provided. An in-class "Hint System" will provide electronic distribution of all scripts, POCs, and so on.
Jim O'Gorman leads Offensive Security's penetration testing team and manages related consulting services. Jim is also an Offensive Security instructor, Kali Developer, and is a co-author of the "Metasploit: The Penetration Tester's Guide". He has been online from the days Gopher sites outnumbered websites and started working professionally in the field 18 years ago.