Kali Linux

Learn Depths of penetration testing with world’s best hacking linux distribution with Axpino Technologies Kali Linux Online Training

Register Here for Attractive Discounts

Kali Linux

No Travel

Low Cost

Expert Guidance

Software Toolkit

Doubt Forum

Authentic Certificate

No Travel

Low Cost

Expert Guidance

Software Toolkit

Doubt Forum

Authentic Certificate

What's Inside the Course

  • Kali Linux Overview
  • Unix vs Linux
  • Different Desktop Environment
  • Installation and Configuration
  • Basic Commands
  • Different types of Users
  • Some Shortcuts
  • What is Proxy?
  • Introduction to VPNs
  • What is Tor?
  • How to hide IP?
  • How to change MAC Address?
  • What is ProxyChains?
  • Gathering Information about a Host
  • DNS Enumeration
  • Brute forcing subdomains against a target host
  • Trace Domain Name Server
  • Network Mapping
  • Port Scanning
  • How to search Exploits?
  • Route Mapping
  • Recognising Web Technologies
  • Identify Domain Informations
  • How to find hidden objects, files and directories on a website?
  • Web Server and Web Application Assessment
  • Web Server Detection
  • CMS Detection
  • Cloudflare Detection
  • Recon and mapping out the target
  • Find websites and web applications for security issues
  • Unix and Linux Security Check
  • SQL injection vulnerability scanning
  • Web Application Vulnerability Hunt
  • Fuzzing
  • Scripting
  • Spidering
  • Proxying
  • Website Cloning
  • Fake Website for Phishing
  • Joomla CMS Analysis
  • WordPress CMS Analysis
  • SQL Injection to Google Dorks
  • SQL Injection
  • Automation
  • Mimic a MySQL Console
  • Identify the different types of Hashes
  • Crack Encrypted Passwords or Data
  • Create Custom Wordlists
  • Offline Password Cracking
  • Auto-detection
  • Password Hash Types
  • Customized Password Cracking
  • Online Password Cracking
  • Distributed Password Cracking
  • Bruteforce Password Cracking
  • Packet Sniffing
  • WEP Cracking
  • WPA/WPA2-PSK Cracking
  • Evil Twin Attack
  • Wifi Jamming
  • DoS Attack
  • Buffer Overflow
  • Honeypot
  • Android Hacking
  • Browser Exploitation
  • Network Analysis
  • Packet Capture and Analysis
  • MITM Attacks against a Network

Meet The Trainers

Harminder Singh Hacker - Axpino Technologies

Harminder Singh

Cyber Security & Forensics Investigator

Harminder Singh is a award winning speaker having more than 7 years of experience in Cyber Crime Investigation and forensics. He worked as consultant to Delhi,Ratnagiri,Amritsar Cyber Cell during early days of his career. He has solved more than 44 cases including Biggest Data theft Cases, Cyber Espionage cases, Phishing cases,Credit card Fraud Cases and many others.

Surender Dabur

Network & Information Security Analyst

Young and dynamic personality of Mr. Surender Dabur has played an important roles in building his strong relationship in his work. He solved many cases of Internet Banking Fraud and Online tracking. He is working for 20 companies as a Cyber Security and Forensic Investigation Trainer. . He is working for the betterment of Indian Security Systems.

What Our Students Say

Axpino Technologies is Trusted by The Best Institutes in The Country

IIT Delhi - Axpino Technologies


IIT Bombay - Axpino Technologies


IIT Kharagpur - Axpino Technologies

IIT Kharagpur

IIT Bhubaneshwar - Axpino Technologies

IIT Bhubanehswar

IIT Hyderabad - Axpino Technologies

IIT Hyderabad

IIT Roorkee - Axpino Technologies

IIT Roorkee

IIT Kanpur - Axpino Technologies

IIT Kanpur

BITS Pilani - Axpino Technologies

BITS Pilani

Register Here and Get Attractive discounts

Kali Linux

You May Also Like to Join

Ethical Hacking Online Course - Axpino Technologies

Network Penetration Testing

With comprehensive coverage of tools, techniques, and methodologies for network penetration testing, Axpino truly prepares you to conduct high-value penetration testing projects step by step and end to end.

Ethical Hacking Course Online - Axpino Technologies

Cyber Forensics

Cyber forensics is an digital discovery technique used to find and reveal digital criminal evidence. It often involves electronic data storage extraction for legal purposes. You will get to learn latest methods to find out evidences from almost all the devices which can help a legal proceeding
Ethical Hacking Course Online - Axpino Technologies

Hacking & Securing Websites

Learn to use latest methodologies to test a web App vulnerability and find out latest remedies. we will take you on a wild and fascinating journey into the cyber security discipline of web application pentesting. This is a very hands-on course with lots of practical stuff.

Frequently Asked Questions

Our online training is real time virtual classroom based training. You will be able to see and interact with our trainer live on your screen. 

Before joining the classes you must have a smartphone/laptop/desktop or any smart device with internet where you can access our live classes.

Toolkit is a set of all the software and tools which will be used throughout the training. 

You will get the link to download all the tools just after the completion of your registration process

Unlike other certifications you will get the certificate after completion of the course which can be authenticated and verified on our website by any person or company

The duration for this course is 20 hours i.e 10 Days. We will be having 10 regular classes 2 hours a day

In case you miss any class. We will Reschedule a backup class for you.

You can ask your doubt during class as you can interact with the trainer directly and also you will have access to our doubt forum where you will be able to post your doubts and trainer will reply you over there.

As we know it is difficult to handle large batch size in a online class, we are keeping a very minimal batch size of 10 students.

© 2014 Axpino Technologies


Verify Certificate
Complains & Suggestions

Close Menu
× Instant Support