Kali Linux

Learn Depths of penetration testing with world’s best hacking linux distribution 

Register Here for Attractive Discounts

Kali Linux

  • Training Type
  • Online Training

No Travel

Low Cost

Expert Guidance

Software Toolkit

Doubt Forum

Authentic Certificate

No Travel

Low Cost

Expert Guidance

Software Toolkit

Doubt Forum

Authentic Certificate

What's Inside the Course

  • Kali Linux Overview
  • Unix vs Linux
  • Different Desktop Environment
  • Installation and Configuration
  • Basic Commands
  • Different types of Users
  • Some Shortcuts
  • What is Proxy?
  • Introduction to VPNs
  • What is Tor?
  • How to hide IP?
  • How to change MAC Address?
  • What is ProxyChains?
  • Gathering Information about a Host
  • DNS Enumeration
  • Brute forcing subdomains against a target host
  • Trace Domain Name Server
  • Network Mapping
  • Port Scanning
  • How to search Exploits?
  • Route Mapping
  • Recognising Web Technologies
  • Identify Domain Informations
  • How to find hidden objects, files and directories on a website?
  • Web Server and Web Application Assessment
  • Web Server Detection
  • CMS Detection
  • Cloudflare Detection
  • Recon and mapping out the target
  • Find websites and web applications for security issues
  • Unix and Linux Security Check
  • SQL injection vulnerability scanning
  • Web Application Vulnerability Hunt
  • Fuzzing
  • Scripting
  • Spidering
  • Proxying
  • Website Cloning
  • Fake Website for Phishing
  • Joomla CMS Analysis
  • WordPress CMS Analysis
  • SQL Injection to Google Dorks
  • SQL Injection
  • Automation
  • Mimic a MySQL Console
  • Identify the different types of Hashes
  • Crack Encrypted Passwords or Data
  • Create Custom Wordlists
  • Offline Password Cracking
  • Auto-detection
  • Password Hash Types
  • Customized Password Cracking
  • Online Password Cracking
  • Distributed Password Cracking
  • Bruteforce Password Cracking
  • Packet Sniffing
  • WEP Cracking
  • WPA/WPA2-PSK Cracking
  • Evil Twin Attack
  • Wifi Jamming
  • DoS Attack
  • Buffer Overflow
  • Honeypot
  • Android Hacking
  • Browser Exploitation
  • Network Analysis
  • Packet Capture and Analysis
  • MITM Attacks against a Network

Meet The Trainers

Harminder Singh

Cyber Security & Forensics Investigator

Harminder Singh is a award winning speaker having more than 7 years of experience in Cyber Crime Investigation and forensics. He worked as consultant to Delhi,Ratnagiri,Amritsar Cyber Cell during early days of his career. He has solved more than 44 cases including Biggest Data theft Cases, Cyber Espionage cases, Phishing cases,Credit card Fraud Cases and many others.

Surender Dabur

Network & Information Security Analyst

Young and dynamic personality of Mr. Surender Dabur has played an important roles in building his strong relationship in his work. He solved many cases of Internet Banking Fraud and Online tracking. He is working for 20 companies as a Cyber Security and Forensic Investigation Trainer. . He is working for the betterment of Indian Security Systems.

What Our Students Say

It was nice experience for me to attend your training. faculties are too good in their field they taught us how to stay safe and secure on internet and how use devices in a secure way.
Dheeraj Jha
Student @ VSICS Kanpur
"After attending this training I got a great addiction to Cyber Forensics. I learnt more than I expected. Hoping to learn more from you guys. Once again,thank you very much "
Akhil Rko
Student @ BITS Pilani
"Their lectures are awesome,easy to understand,and any one will never get bore.This is all due to his art of teaching.They firstly use to develop curiosity before starting of topic as a result of which students pay more attention toward them."
Tirupati Raman Mishra
Student @ JK Institute of Applied Physics and Technology
“They teaches as a friend and also explains as a teacher. Their classes are so interesting and enjoyable and the knowledge they impart is practical and useful. Thank you Axpino Technologies for this Opportunity"
Sarvagya Gupta
Merchant Navy

We are Trusted by The Best Institutes in The Country

IIT DELHI

IIT BOMBAY

IIT Kharagpur

IIT Bhubanehswar

220px-Indian_Institute_of_Technology_Hyderabad_logo.svg

IIT Hyderabad

IITR_new_logo_color

IIT Roorkee

IIT Kanpur

BITS Pilani

Register Here and Get Attractive discounts

Kali Linux

  • Training Type
  • Online Training

You May Also Like to Join

Network Penetration Testing

With comprehensive coverage of tools, techniques, and methodologies for network penetration testing, Axpino truly prepares you to conduct high-value penetration testing projects step by step and end to end.

DF1

Cyber Forensics

Cyber forensics is an digital discovery technique used to find and reveal digital criminal evidence. It often involves electronic data storage extraction for legal purposes. You will get to learn latest methods to find out evidences from almost all the devices which can help a legal proceeding

Hacking & Securing Websites

Learn to use latest methodologies to test a web App vulnerability and find out latest remedies. we will take you on a wild and fascinating journey into the cyber security discipline of web application pentesting. This is a very hands-on course with lots of practical stuff.

Frequently Asked Questions

Our online training is real time virtual classroom based training. You will be able to see and interact with our trainer live on your screen. 

Before joining the classes you must have a smartphone/laptop/desktop or any smart device with internet where you can access our live classes.

Toolkit is a set of all the software and tools which will be used throughout the training. 

You will get the link to download all the tools just after the completion of your registration process

Unlike other certifications you will get the certificate after completion of the course which can be authenticated and verified on our website by any person or company

The duration for this course is 20 hours i.e 10 Days. We will be having 10 regular classes 2 hours a day

In case you miss any class. We will Reschedule a backup class for you.

You can ask your doubt during class as you can interact with the trainer directly and also you will have access to our doubt forum where you will be able to post your doubts and trainer will reply you over there.

As we know it is difficult to handle large batch size in a online class, we are keeping a very minimal batch size of 10 students.

© 2014 Axpino Technologies

HELP & INFORMATION

Help
Verify Certificate
Complains & Suggestions

Close Menu
Instant Support