In this level 2 class, we continue our exploration and attacks using Kali Linux against infrastructure. We will use a variety of tools like Metasploit, John the Ripper, and PowerSploit for PowerShell.
This class will cover the implementation of a testing system and systems to practice on as well as the practical tests themselves. For information on installing Kali see the Level 1 class. Recommended as the 7th and final course in the Information Security Certificate.
Performance Objectives: Upon completion of this course you should be able to:
Competencies covered in this course: Defending network, implementing systems for testing and utilizing programs for testing
Intended Audience: Anyone interested in defending their networks and applications from attack
Recommended Prerequisite: To be successful in this course, you should be familiar with using personal computers, the mouse and keyboard. You should be able to use Windows to launch and close programs; navigate to information stored on the computer; and manage files and folders. Strong knowledge of the Windows OS. Recommended as the 7th and final course in the Information Security Certificate