Penetration Testing with Kali Linux

[mks_tabs nav=”horizontal”]
[mks_tab_item title=”نام دوره”]
Penetration Testing with Kali Linux
[/mks_tab_item]
[mks_tab_item title=”سرفصلهای دوره:”]

سر فصل آموزش Penetration Testing with Kali Linux

1-Passive Information Gathering 
2-Active Information Gathering 
3- Vulnerability Scanning
4- Buffer Overflows
5- Win32 Buffer Overflow Exploitation
6- Linux Buffer Overflow Exploitation
7- Working with Exploits
8- File Transfers
9- Privilege Escalation
10- Client Side Attacks
11- Web Application Attacks
12- Password Attacks
13- Port Redirection and Tunneling
14- The Metasploit Framework
15- Bypassing Antivirus Software
[/mks_tab_item]
[mks_tab_item title=”تعداد ساعت”]
60 ساعت
[/mks_tab_item]
[mks_tab_item title=”پیش نیاز دوره:”]

Install Kali Linux

Ceh

Windows10Learn Hacking Windows 10 Using Metasploit From Scratch
[/mks_tab_item]
[/mks_tabs]