KAS Certified Penetration Tester

KAS Certified Penetration Tester

Disclaimer

The course material presented herein is to be used for educational purposes only. It is intended to impart knowledge related to “Computer Security” and is in no way related to “CRACKING” or “HACKING” (unethical).

KAS does not condone illegal, unethical or irresponsible actions.

Students are strictly warned not to use the knowledge and skills you gained during the course/workshops for malicious attacks, nor attempt to access without authority or compromise any programme or data held in any computer regardless of the intent. Any such acts may be in contravention of the law and you will bear full and sole responsibility for your actions.

Table of Content

The entire Kali Linux playlist is at the following link:

https://www.youtube.com/playlist?list=PLrHVSJmDPvlqK4TKKSSZyYT-SJQc6oAZ7

Join our CryberSecurity Guild Facebook group

Cyber Crime Defined

Security Policy

Introduction to Oracle VirtualBox

Virtual machine (VM).

This is the special environment that Oracle VM VirtualBox creates for your guest OS while it is running. In other words, you run your guest OS in a VM. Normally, a VM is shown as a window on your computer's desktop.

Social Engineering (Toolkit)

Naabu ~ Port Scanner

Hydra

For enquiry please email us at

kas@kaslearning.org

or fill in the registration form with the code: KIV-KAS-CPT

and be inform when this course is open.