Course Overview
Kali Linux is one of the most powerful distributions that we have for performing Ethical Hacking and Penetration Testing. This advanced training will help ethical hackers start their practical journey in this field. In this course, we will cover the Command Line Interface (CLI) of Linux OS and perform various operations such as file management, user and group management, installing and uninstalling software, and exploring other commands related to ethical hacking. By the end of this course, students will have the skills to effectively use Kali Linux for ethical hacking and penetration testing, making it ideal for cybersecurity professionals, ethical hackers, and security enthusiasts.
Syllabus
Chapter I – Introduction to Kali Linux
- Introduction to Linux Operating System
- Difference between Linux and Windows OS
- Various Linux Distributions
- Installing Kali Linux on a Virtual Platform
Chapter II – Lab Setup
- Virtualization (VMware, VirtualBox, KVM)
- Troubleshooting Installation Issues
- Downloading and installing Oracle Virtual Box
- Downloading and installing Kali Linux
Chapter III – Overview of Linux
- Introduction to Linux OS
- Various Linux Distributions
- Understanding Kali Linux
Chapter IV – File Handling
- Accessing and Navigating the Command Line Interface
- Managing Files through Command Line Operations
- Creating, Viewing, and Editing Text Files
- Managing Linux File System Permissions for File Access Control
- Monitoring and Administering Linux Processes
- Working with Vim and Nano text editors
- Using Find and Grep commands for searching and pattern matching
Chapter V – User Administration
- Creating New User Accounts
- Setting and Changing Passwords for Users
- Removing or Deleting User Accounts
- Retrieving User Information
- Obtaining Password Hashes of Linux Users
Chapter VI – Group Administration
- Creating New Groups
- Adding Users to Specific Groups
- Establishing Administrative Users for Groups
- Removing Users from Groups
- Deleting Existing Groups
- Obtaining Group Information
Chapter VII – Linux Package Manager
- Understanding various kinds of Package Managers
- Updating the Repository
- Upgrading Applications
- Installing Application and Softwares using Package Managers
- Removing Application from Kali Linux
Chapter VIII – Standard Input, Output, and Error
- Understanding Standard Input, Output and Error in Linux
- Working with various use cases
- Linux Operators
- Combination of Linux Operators
Chapter IX – Task Automation
- Understanding Cronjobs
- Working with Crontab tool
- Scheduling Tasks for different Users
- Online Websites to generate Crontab line
Chapter X – File Compression and Archiving
- Understanding the concept behind the Compression and Archiving
- Compressing Files and Directories using various tools
- Decompressing Files and Directories
- Grouping Files of similar types
- Adding Files in an existing Archive
- Extracting Files from Archive
Chapter XI – Process Management
- Understanding Linux Processes
- Managing Processes on Linux using various tools
- Terminating Processes
Chapter XII – Network Configuration and Administration
- Configuring Network Settings
- Enabling and Disabling Network Interfaces
- Providing Static IP Address
- Setting Host Names and Configuring Name Resolution
- Configuring Hosts file
Chapter XIII – SSH & HTTP Configuration
- Setting up SSH and SecureCopy (SCP) Configurations
- Password-less Login on SSH and SCP
- Basic Firewall Configuration using Firewalld
- Configuring Secure Rules on Firewall
- Setting up different Zones
Chapter XIV – Configuring Linux based Firewall for Security
- Introduction to Firewalls (iptables, nftables, UFW)
- Configuring Traffic Filtering Rules
- Logging & Monitoring Firewall Activity
- NAT & Port Forwarding
- Hardening Firewall Security