Module 2: Penetration Testing with Kali Linux: General Course Information
Getting Started with PWK
PWK Course Materials
Student Mentors and Support
Setting up Kali
Connecting to the PWK Lab
How to Approach the Course
A Model of Increasing Uncertainty
Learning Modules
Demonstration Module Exercises
Applied Module Exercises
Capstone Module Labs
Assembling the Pieces
Challenge Labs 1-3
Challenge Labs 4-6
Summary of PWK Learning Modules
Getting Started: Optional Ramp-up Modules
Enumeration and Information Gathering
Web Application and Client Side Attacks
Other Perimeter Attacks
Privilege Escalation and Lateral Movement
Active Directory
Challenge Lab Preparation
Last updated