Call Us : 080-41659578
Mail Us : info@bytecodebangalore.com
Follow Us :

Home » Kali Linux

Kali Linux

KALI LINUX CERTIFICATION EXAM

COURSE EXAM CODE NORMAL & STEADY TRACK FAST & FURIOUS TRACK
Kali Linux 7 4
Course duration: 80 Hours
Training Fees: 20 + SV
Certification: CBE- Certified Backtrack Expert
Kit: Tools, Ebook, Book, Exam Voucher

 

  • COURSE CONTENT
    • KALI LINUX

      1.0 > INFORMATION GATHERING

      1.1 > NETWORK ANALYSIS

      1.1.1 > DNS ANALYSIS

      1.1.1.1 > Dnsenum
      1.1.1.2 > Dnsmap
      1.1.1.3 > Dnsrecon
      1.1.1.4 > Dnswalk

      1.1.1.5 > Fierce
      1.1.1.6 > Dnsdict6
      1.1.1.7 > Dnstracer
      1.1.1.8 > Maltego

    • 1.1.2 > LIVE HOST HOSTS

      1.1.2.1 > Netdiscover
      1.1.2.2 > Fping
      1.1.2.3 > Angry ip scanner
      1.1.2.4 > Otrace
      1.1.2.5 > Wol -e
      1.1.2.6 > Zemap
      1.1.2.7 > Nmap

      1.1.2.8 > Traceout
      1.1.2.9 > Alive
      1.1.2.10 > Netifera
      1.1.2.11 > Trace 6
      1.1.2.12 > Hping
      1.1.2.13 > Arping

    • 1.1.3 > IDS IPS IDENTIFICATION

      1.1.3.1 > Pentbox
      1.1.3.2 > Snort

      1.1.3.3 > Honeyd

    • 1.1.4 > NETWORK SCANNERS

      1.1.4.1 > Nmap
      1.1.4.2 > Zemap
      1.1.4.3 > Devtest
      1.1.4.4 > Lanmap

      1.1.4.5 > Netifera
      1.1.4.6 > Autoscan
      1.1.4.7 > Unicornscan

    • 1.1.5 > NETWORK TRAFFIC SCANNER

      1.1.5.1 > Wireshark
      1.1.5.2 > Tshark

      1.1.5.3 > Xplico

    • 1.1.6 > OS FINGERPRINTING

      1.1.6.1 > Nmap
      1.1.6.2 > Pof

      1.1.6.3 > Zemap
      1.1.6.4 > Xprobe 2

    • 1.1.7 > OSINT ANALYSIS

      1.1.7.1 > Jigsaw
      1.1.7.2 > Recon-ng

      1.1.7.3 > Creepy

    • 1.1.8 > ROUTE ANALYSIS

      1.1.8.1 > Dmitry
      1.1.8.2 > Tctrace

      1.1.8.3 > Lanmap2
      1.1.8.4 > Protos

    • 1.1.9 > SERVICE FINGERPTINTING

      1.1.9.1 > Nmap
      1.1.9.2 > Dmitry
      1.1.9.3 > Zemap

      1.1.9.4 > Amap
      1.1.9.5 > Httprint

    • 1.1.10 > SMB SERVICE

      1.1.10.1 > Metasploit

    • 1.1.11 > TELEPHONY ANALYSIS

      1.1.11.1 > Warbox

      1.1.11.2 > Iwox

    • 1.1.12 > VPN ANALYSIS

      1.1.12.1 > Ike-scan

    • 1.2 > WEB APPLICATION ANALYSIS

      1.2.1.> CMS IDENTIFICATION

      1.2.1.1 > Cms-explorer
      1.2.1.2 > Blind Elephant

      1.2.1.3 > Plecast
      1.2.1.4 > Whatweb

    • 1.2.2 > IDS IPS IDENTIFICATION

      1.2.2.1 > Ua Tester

      1.2.2.2 > Waffit

    • 1.2.3 > OPEN SOURCE ANALYSIS

      1.2.3.1 > Urlcrazy
      1.2.3.2 > Goofile

      1.2.3.3 > Metagofile
      1.2.3.4 > Maltegorazy

    • 1.2.4 > WEB CRAWLERS

      1.2.4.1 > Golismero
      1.2.4.2 > Brupsuite
      1.2.4.3 > Crawler

      1.2.4.4 > Webshag
      1.2.4.5 > Dirb

    • 1.3 > DATABASE ANALYSIS

      1.3.1 > MSSQL ANALYSIS

      1.3.2 > MYSQL ANALYSIS

      1.3.3 > ORCLE ANALYSIS

    • 2.0 > VULNERABILITY ASSESSMENT

      2.1 > VULNERABILITY SCANNERS

      2.1.1 > OPEN VAS

    • 2.2 > NETWORK ASSESSMENT

      2.2.1 > CISCO TOOLS

      2.2.1.1 > Cisco-Auditing-Tool
      2.2.1.2 > Ciscos

      2.2.1.3 > Copy-Router-Config
      2.2.1.4 > Tftp-Bruteforce

    • 2.2.2 > NETWORK FUZZERS

    • 2.3 > WEB APPLICATION ASSESSMENT

      2.3.1 > CMS VULNERABILITY IDENTIFICATION

      2.3.1.1 > Joomscan

      2.3.1.2 > Plecast

    • 2.3.2 > WEB APPLICATION FUZZERS

      2.3.2.1 > Dirbuster
      2.3.2.2 > Powerfuzzer

      2.3.2.3 > Webshag

    • 2.3.3 > WEB PROXY SCANNERS

      2.3.3.1 > Owasp-Zap

      2.3.3.2 > Brupsuite

    • 2.3.4 > OPEN SOURCE ASSESSMENT

      2.3.4.1 > Gooscan
      2.3.4.2 > Metagoofile

      2.3.4.3 > Theharvester
      2.3.4.4 > Shodan

    • 2.3.5 > DATABASE ASSESSMENT

      2.3.5.1 > Darkmysql
      2.3.5.2 > Sqlninja

      2.3.5.3 > Sqlmap

    • 2.4 > VULNERABILITY SCANNERS

      2.4.1 > ASP-AUDTIOR

      2.4.2 > GRABBER

      2.4.3 > BRUPSUITE

      2.4.4 > NIKTO

      2.4.5 > UNISCAN

      2.4.6 > GRENDAL SCAN

      2.4.7 > W3AF

      2.4.8 > MOPEST

      2.4.9 > SQLMAP

      2.4.10 > WEBSURIFY

      2.4.11 > VEGA

      2.4.12 > WAPITI

    • 3.0 > EXPLOITATION TOOLS

      3.1 > NETWORK EXPLOITATION TOOLS

      3.1.1 > CISCO ATTACK

      3.1.1.1 > Bruteforce on Cisco Routers

    • 3.1.2 > METASPLOIT

      3.1.2.1 > Introduction
      3.1.2.2 > Fundamental
      3.1.2.3 > Information Gathering

      3.1.2.4 > Vulnerability Scanning
      3.1.2.5 > Fuzzer
      3.1.2.6 > Exploit

    • 3.1.3 > ARMITAGE

      3.1.4 > WEBSPLOIT

      3.1.5 > FASTTRACK

      3.1.6 > SAP

    • 3.2 > WEB EXPLOITATION TOOLS

      3.2.1 > ASP-AUDTIOR

      3.2.2 > DARKMYSQL

      3.2.3 > FIMAP

      3.2.4 > WA3F

      3.2.5 > WEBSURIFY

      3.2.6 > SQLMAP

      3.2.7 > SQLNINJA

      3.2.8 > XSSER

      3.2.9 > WEBSPLOIT

    • 3.3 > DATABASE EXPLOITATION TOOLS

      3.3.1 >SQLMAP

    • 3.4 > WIRELESS EXPLOITATION TOOLS

      3.4.1 > FERN WIFI CRACKER

      3.4.2 > GERIX WIFI CRACKER

      3.4.3 > KISMET

      3.4.4 > AIRODUMP-NG

      3.4.5 > WIFITE

      3.4.6 > AIRCRACK

    • 3.5 > SOCIAL ENGINEERING TOOL

      3.5.1 > SET

      3.5.2 > BEEF

    • 3.6 > PHYSICAL EXPLOITATION

      3.6.1 > U3-OWN

    • 4.0 > PRIVILAGE ESCALATION

      4.1 > PASSWORD ATTACKS

      4.1.1 > OFFLINE ATTACK

      4.1.1.1 > Chnptw
      4.1.1.2 > Ophcrack
      3.1.1.1 > 4.1.1.3 > Crunh
      4.1.1.4 > Cupp
      4.1.1.5 > John and Ripper

      4.1.1.6 > Hash
      4.1.1.7 > Hashcut
      4.1.1.8 > Fcrack
      4.1.1.9 > Truecrack

    • 4.1.2 > ONLINE ATTACK

      4.1.2.1 > Hydra
      4.1.2.2 > Findmyhash

      4.1.2.3 > Hydra-gtk

    • 4.2 > PROTOCOL ANALYSIS

      4.2.1 > NETWORKS SNIFFERS

      4.2.1.1 > Ettercap
      4.2.1.2 > Xplito

      4.2.1.3 > Wireshark
      4.2.1.4 > Hamester

    • 4.3 > SPOOFING ATTACK

      4.3.1 > NETWORK SPOOFING

    • 5.0 > MAINTAINING ACCESS

      5.1 > OS BACKDOORS

      5.1.1 > NETCUT

      5.1.2 > SWARPROO

      5.1.3 > MSFPAYLOAD

      5.1.4 > WEBSHELLS

      5.1.5 > MSFENCODE

    • 5.2 > WEB BACKDOOR

      5.2.1 > SHELLS

      5.2.2 > WEEVELY

      5.2.3 > MSFPAYLOAD

      5.2.4 > WEBSHELLS

      5.2.5 > MSFENCODE

    • 6.0 > FORENSICS

      6.1 > ANTI VIRUS FORENSICS TOOLS

      6.1.1 > CHHROOTKIT

      6.1.2 > RKHUNTER

    • 6.2 > DIGITAL ANTI FORENSICS

      6.2.1 > TRUECRYPT

    • 6.3 > DIGITAL FORENSICS

    • 6.4 > FORENSICS HASHING TOOLS

      6.4.1 > MD5DEEP

      6.4.2 > SDADEEP

      6.4.3 > HASHDEEP

    • 6.5 > NETWORK FORENSICS

      6.5.1 > WIRESHARK

      6.5.2 > XPLICO

    • 6.6 > PASSWORD FORENSICS TOOLS

      6.6.1 > CMOS

      6.6.2 > FCREACKZIP

      6.6.3 > SAMDUMP

    • 6.7 > PDF FORENSICS TOOLS

    • 6.8 > RAM FORENSICS TOOLS

    • 7.0 > REPORTING TOOLS

    • 8.0 > SERVICES

    • 9.0 > MISCELLANEOUS


  • BENEFITS
    • BENEFITS OF ACHIEVING THIS CERTIFICATION

      Training by best security expert or well experienced trainers.

      International BYTE CODE Training Certification + 2 years free membership of BYTE CODE

      Training under the interactive and lab intensive environment equips the professionals with in-depth knowledge.

      The course tools and programs are preloaded on the iLabs machine and hence saves productive time and effort.

      The professionals can confirm their potentials of being an expert in security systems.

      Learning from the experienced and leading experts.


  • PACKAGE DETAILS
    • COMPLETE PACHAGE DETAILS FOR INDIAN & INTERNATIONAL STUDENTS

      Our Package includes:

      Official Training by certified instructors

      Head-2-Head training by Certified Subject matter experts

      Highly interactive lectures, group exercises, and review sessions

      Intensive Hands-on Training

      2 years membership of bytecode international training group

      Chance to become country representative for bytecode

      Certification Exam Fees Included.

      Individual study environment

      Training Environment

      Practical live hacking

      Concept based training

      24/7 High speed internet connectivity

      Limited candidates in class

      Stay, food( breakfast, lunch and dinner)

      Post training support after training & certification


Email ID: info@bytecodebangalore.com
Tel No.: 080-41659578

ENQUIRE NOW



TALK TO US

Name: Mr. Anmol Gupta
Email: info@bytecodebangalore.com
Tel (HQ) : 080-41659578