KAS Certified Penetration Tester
KAS Certified Penetration Tester
Disclaimer
The course material presented herein is to be used for educational purposes only. It is intended to impart knowledge related to “Computer Security” and is in no way related to “CRACKING” or “HACKING” (unethical).
KAS does not condone illegal, unethical or irresponsible actions.
Students are strictly warned not to use the knowledge and skills you gained during the course/workshops for malicious attacks, nor attempt to access without authority or compromise any programme or data held in any computer regardless of the intent. Any such acts may be in contravention of the law and you will bear full and sole responsibility for your actions.
Table of Content
The entire Kali Linux playlist is at the following link:
https://www.youtube.com/playlist?list=PLrHVSJmDPvlqK4TKKSSZyYT-SJQc6oAZ7
Join our CryberSecurity Guild Facebook group
Cyber Crime Defined
Security Policy
Introduction to Oracle VirtualBox
Virtual machine (VM).
This is the special environment that Oracle VM VirtualBox creates for your guest OS while it is running. In other words, you run your guest OS in a VM. Normally, a VM is shown as a window on your computer's desktop.
Social Engineering (Toolkit)
Naabu ~ Port Scanner
Hydra
For enquiry please email us at
or fill in the registration form with the code: KIV-KAS-CPT
and be inform when this course is open.