• Exclusive

    Hey Guest, unlock an instant 10% bonus discount when you upgrade via the Crypoverse gateway.

IT & Software Penetration Testing with Kali Linux (MiX) (1 Viewer)

Currently reading:
 IT & Software Penetration Testing with Kali Linux (MiX) (1 Viewer)

Covers web development, programming, AI, cloud computing, DevOps, and cybersecurity.
Recently searched:

protectaccount

Member
Amateur
LV
4
Joined
Nov 21, 2025
Threads
1,137
Likes
104
Awards
9
Credits
23,178©
Cash
0$
2511180909100353.png


From the creators of Kali Linux comes the industry-leading ethical hacking course Penetration Testing with Kali Linux (PWK). This is the only official Kali Linux training course and is offered through Offensive Security. By successfully completing the course and passing the performance-based exam, you can become an Offensive Security Certified Professional (OSCP). The OSCP is increasingly being recognized across the industry as the premier penetration testing certification. Boost your career today.
Offensive Security Certified Professional

The OSCP is the most recognized certification in the information security industry. To become certified you must complete the PWK course and pass the 24-hour hands-on test that is conducted in a completely unfamiliar network environment. Students must demonstrate their ability to research the network, identify any vulnerabilities and successfully execute attacks.
This book is not obtainable without having access to the PWK course and thus doesn’t have an ISBN number.

Paperback: 361 pages
===============================================================================================================================================================

Staff note – This book contains sample PowerShell scripts and other content that may be flagged by some antivirus engines as a PowerShell trojan or other false positive.

Updated courseware for 2020. The PEN-200 course covers the following topics:

Penetration Testing: What You Should Know
Getting Comfortable with Kali Linux
Command Line Fun
Practical Tools
Bash Scripting
Passive Information Gathering
Active Information Gathering
Vulnerability Scanning
Web Application Attacks
Introduction to Buffer Overflows
Windows Buffer Overflows
Linux Buffer Overflows
Client-Side Attacks
Locating Public Exploits
Fixing Exploits
File Transfers
Antivirus Evasion
Privilege Escalation
Password Attacks
Port Redirection and Tunneling
Active Directory Attacks
The Metasploit Framework
PowerShell Empire
Assembling the Pieces: Penetration Test Breakdown
Trying Harder: The Labs
This book is not available without buying the PEN-200 course and does not have an ISBN.


Link:
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom