Looking for Powerpoint slides and lectures that will put you to sleep? Keep moving, because this course is not for you.
This course consists of 100% hands-on technical labs, utilizing Kali
Linux to hack a variety of intentionally vulnerable operating systems.
All of the resources to build the labs are free. Detailed instructions
on how to set up the labs are included within this course (VMware
Player, Kali Linux, Kioptrix, etc.). To make the most out of this
course, it is recommended that you actually perform the activities
within the labs rather than just watch the videos.
The main points that will be covered in this course is enumeration, remote exploitation, buffer overflows, and privilege escalation. These labs will show you how to interpret results from tools such as Nmap, Dirb, and enum4linux, and use them effectively to compromise vulnerable systems. Please note that these labs contain spoilers, and it is a good idea to attempt to compromise the vulnerable systems on your own prior to getting the answers from the walk through that's provided.
The following is an overview of the labs contained within this course:
Lab 1: Download and Configure Kali Linux
Lab 2: Kioptrix Level 1 - Enumeration and Exploitation
Lab 3: Kioptrix Level 2 - Enumeration and Exploitation
Lab 4: Kioptrix Level 3 - Enumeration and Exploitation
Lab 5: Kioptrix Level 5 - Enumeration and Exploitation
Lab 6: Tr0ll 1 - Enumeration and Exploitation
Lab 7: Tr0ll 2 - Enumeration and Exploitation
The following are bonus labs that were added to the curriculum:
Bonus Lab 1: Security Onion Lab Setup with VirtualBox
Bonus Lab 2: Kali Linux Setup with VirtualBox
Bonus Lab 3: Windows 7 Eternalblue Vulnerable VM VirutalBox Setup
Bonus Lab 4: Windows 7 Eternalblue Exploitation and Snort/PCAP Analysis
Bonus Lab 5: Ubuntu Server 12.04 Vulnerable VM VirtualBox Setup
Bonus Lab 6: Ubuntu Server 12.04 Heartbleed Exploitation and Snort/PCAP Analysis
What are the requirements?
What am I going to get from this course?
What is the target audience?
Jesse Kurrus is a cybersecurity professional with strong network
security analysis and intrusion detection experience. Jesse is skilled
in utilizing commercial and proprietary Security Information and Event
Management (SIEM) technology to create rules, filters, generate reports,
and analyze correlations and events. Other professional strengths
include cybersecurity, ethical hacking, penetration testing, training, and
technical writing. Jesse has a true passion for cybersecurity and
information technology, and an insatiable ambition to further his
knowledge and professional skill set.
Specialties: Intrusion Detection / Network Security Monitoring (Security Onion, Snort, Bro, and Suricata); SIEM Technology (Elasticsearch, Logstash, Kibana (ELK), ArcSight, and Splunk); PCAP analysis (Tcpdump, Wireshark, NetworkMiner, NetWitness/Security Analytics); Penetration Testing (Kali Linux, BurpSuite, Nikto, Nmap, Metasploit, etc.)
Current Degrees/Certifications: M.S. in Information Technology with Information Assurance Specialization / B.S. in Computer Networks and Security / Network+, A+, Security+, Linux+, Certified Ethical Hacker v8 (CEH), Offensive Security Certified Professional (OSCP), Certified Information Systems Security Professional (CISSP)