Module 2: Penetration Testing with Kali Linux: General Course Information

Getting Started with PWK

PWK Course Materials

Student Mentors and Support

Setting up Kali

Connecting to the PWK Lab

How to Approach the Course

A Model of Increasing Uncertainty

Learning Modules

Demonstration Module Exercises

Applied Module Exercises

Capstone Module Labs

Assembling the Pieces

Challenge Labs 1-3

Challenge Labs 4-6

Summary of PWK Learning Modules

Getting Started: Optional Ramp-up Modules

Enumeration and Information Gathering

Web Application and Client Side Attacks

Other Perimeter Attacks

Privilege Escalation and Lateral Movement

Active Directory

Challenge Lab Preparation

Last updated