We may earn an affiliate commission when you visit our partners.
Gavin Johnson-Lynn

Kali contains an array of tools to assist with security assessments and penetration tests. This course will teach you how to use some of those tools to exploit the systems you find, moving you into a position to perform post exploitation tasks.

Read more

Kali contains an array of tools to assist with security assessments and penetration tests. This course will teach you how to use some of those tools to exploit the systems you find, moving you into a position to perform post exploitation tasks.

A large number of security tools are available to help with a penetration test and understanding how to use them is critical to make testing effective. In this course, Exploitation with Kali Linux, you’ll learn to exploit the vulnerabilities you find. First, you’ll learn how to access systems using CrackMapExec. Next, you’ll discover how to create and use payloads to initially exploit a computer. Finally, you’ll learn how to use Metasploit alone to exploit remote systems and prepare for post exploitation. When you’re finished with this course, you’ll have the skills and knowledge to comfortably exploit computers within a network.

Enroll now

What's inside

Syllabus

Course Overview
Initial Exploitation with CrackMapExec
Exploitation with MSF Payloads
Further Exploitation with Metasploit
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Thoroughly covers post exploitation tasks, which are essential for successful penetration tests
Leverages Kali Linux, a popular and widely used tool in the field of security assessments and penetration testing
Leaves students with a solid understanding of how to exploit computer systems within a network
Taught by Gavin Johnson-Lynn, who is an experienced professional in the field of information security
May require students to have some prior knowledge of security assessments and penetration testing
Does not provide hands-on labs or interactive materials, which can limit the practical application of the concepts learned

Save this course

Save Exploitation with Kali Linux to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Exploitation with Kali Linux with these activities:
Review basic networking concepts
Refresh your understanding of fundamental networking concepts to enhance your comprehension of the tools and techniques taught in this course.
Browse courses on Networking
Show steps
  • Review network topologies
  • Go over network protocols
  • Practice using networking tools
Create a cheat sheet on MSF payload types
Deepen your understanding of MSF payloads by creating a comprehensive cheat sheet that summarizes their various types and functions.
Show steps
  • Research different MSF payload types
  • Organize the information into a cheat sheet
  • Review and update the cheat sheet regularly
Practice using CrackMapExec for initial exploitation
Reinforce your understanding of CrackMapExec and gain proficiency in using it for identifying and exploiting vulnerabilities.
Show steps
  • Set up a vulnerable system
  • Use CrackMapExec to scan and identify vulnerabilities
  • Exploit the vulnerabilities using CrackMapExec
Four other activities
Expand to see all activities and additional details
Show all seven activities
Follow tutorials on post-exploitation techniques
Expand your knowledge by exploring tutorials that cover advanced post-exploitation techniques, such as privilege escalation and lateral movement.
Show steps
  • Identify reputable tutorials
  • Follow the tutorials
  • Practice the techniques in a lab environment
Conduct penetration tests in a simulated environment
Enhance your practical skills by simulating real-world penetration testing scenarios and practicing the entire process of identifying, exploiting, and post-exploiting vulnerabilities.
Show steps
  • Set up a simulated network environment
  • Use Kali Linux to conduct penetration tests
  • Analyze results and identify vulnerabilities
  • Exploit vulnerabilities and perform post-exploitation tasks
Create a comprehensive study guide
Reinforce your understanding by compiling a comprehensive study guide that summarizes key concepts, techniques, and tools covered in the course.
Show steps
  • Review course materials
  • Organize and synthesize information
  • Create a well-structured study guide
Participate in CTF competitions
Challenge yourself and test your skills by participating in Capture the Flag (CTF) competitions that involve solving real-world security challenges.
Show steps
  • Identify reputable CTF competitions
  • Form a team or participate individually
  • Solve challenges and earn points

Career center

Learners who complete Exploitation with Kali Linux will develop knowledge and skills that may be useful to these careers:
Ethical Hacker
Ethical Hackers are hired by organizations to try to break into their computer systems and identify vulnerabilities. Ethical Hackers work to improve the security of computer systems by identifying and fixing vulnerabilities. Exploitation with Kali Linux is the study of how to exploit these vulnerabilities.
Penetration Tester
Penetration Testers try to break into computer systems to identify vulnerabilities that could be exploited by attackers. Penetration Testers work to improve the security of computer systems by identifying and fixing vulnerabilities. Exploitation with Kali Linux is the study of how to exploit these vulnerabilities.
Information Security Analyst
Information Security Analysts identify and assess security risks to an organization's information assets. Information Security Analysts develop and implement security controls to protect those assets. Exploitation with Kali Linux may be helpful for building a foundation in common security tools and vulnerabilities.
Systems Administrator
Systems Administrators manage and maintain computer systems. Systems Administrators install and configure software and hardware, and they monitor system performance for problems. Exploitation with Kali Linux may be helpful for building a foundation in common security tools and vulnerabilities.
Software Developer
Software Developers design and develop computer software. Software Developers may specialize in a particular area of software development, such as security. Exploitation with Kali Linux may be helpful for building a foundation in common security tools and vulnerabilities.
Cybersecurity Analyst
Cybersecurity Analysts implement and maintain security controls to protect computer networks and systems. Cybersecurity Analysts defend an organization's computer networks from malicious attacks. Exploitation with Kali Linux may be helpful for building a foundation in common security tools and vulnerabilities.
Network Security Engineer
Network Security Engineers design and implement security measures to protect an organization's computer networks and systems. Network Security Engineers investigate security breaches and take steps to prevent future attacks. Exploitation with Kali Linux may be helpful for building a foundation in common security tools and vulnerabilities.
Security Consultant
Security Consultants help organizations to improve their security posture. Security Consultants assess an organization's security risks and recommend measures to mitigate those risks. Exploitation with Kali Linux may be helpful for building a foundation in common security tools and vulnerabilities.
Incident Responder
Incident Responders respond to computer security incidents. Incident Responders work to contain the damage caused by the incident and to restore the affected systems to normal operation. Exploitation with Kali Linux may be helpful for building a foundation in common security tools and vulnerabilities.
Cybersecurity Engineer
Cybersecurity Engineers design and implement security solutions for organizations. Cybersecurity Engineers work to protect an organization's computer networks and systems from malicious attacks. Exploitation with Kali Linux may be helpful for building a foundation in common security tools and vulnerabilities.
Security Administrator
Security Administrators manage and maintain an organization's security systems. Security Administrators install and configure security software and hardware, and they monitor security logs for suspicious activity. Exploitation with Kali Linux may be helpful for building a foundation in common security tools and vulnerabilities.
Security Architect
Security Architects design and implement security solutions for organizations. Security Architects work to protect an organization's computer networks and systems from malicious attacks. Exploitation with Kali Linux may be helpful for building a foundation in common security tools and vulnerabilities.
IT Auditor
IT Auditors evaluate an organization's IT systems and controls to ensure that they are operating securely and efficiently. IT Auditors may also perform penetration tests to identify vulnerabilities in an organization's computer systems. Exploitation with Kali Linux may be helpful for building a foundation in common security tools and vulnerabilities.
Forensic Analyst
Forensic Analysts investigate computer crimes and cyberattacks. Forensic Analysts collect and analyze evidence from computer systems to identify the attackers and determine the scope of the attack. Exploitation with Kali Linux may be helpful for building a foundation in common security tools and vulnerabilities.
Network Administrator
Network Administrators manage and maintain computer networks. Network Administrators install and configure network hardware and software, and they monitor network performance for problems. Exploitation with Kali Linux may be helpful for building a foundation in common security tools and vulnerabilities.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Exploitation with Kali Linux.
Provides a comprehensive overview of exploitation techniques that can be used with Kali Linux. This book adds more depth to the course and useful reference tool.
This in-depth introduction to Metasploit can be used to support the course material. It would be a valuable supplement to the course.
Contains practical guidance that will support the techniques learned in this course. It would be useful as a current reference.
Provides valuable information on exploitation and penetration testing. It would be valuable as background knowledge and as additional reading.
Explains Python specifically as it relates to Kali Linux. It adds more depth to the course and useful reference tool.
Provides valuable information on exploitation and penetration testing. It can be used to provide background knowledge.
Provides valuable information on exploitation and penetration testing. It can be used to provide background knowledge.
Provides valuable background knowledge for the course. It would be useful as additional reading.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Exploitation with Kali Linux.
Post Exploitation with Meterpreter
Most relevant
Metasploit: Getting Started
Most relevant
Post Exploitation with Kali Linux
Most relevant
Practice Your First Penetration Test: Kali & Metasploit...
Most relevant
Attacks and Exploits: Specialized Attacks and Post...
Most relevant
Exploitation with PowerShell
Most relevant
Web Application Analysis with Kali Linux
Most relevant
Perform Attacks with Metasploit
Most relevant
Hacking and Patching
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser