|
Compatible with the latest version of Kali Linux Kali-1 Introductory seminar on cybersecurity using Kali Linux Our company Takeshita, who will be giving practical training and lectures at DEFCON Introductory seminar on penetration testing using Kali Linux Port scanning, vulnerability testing, remote control of smartphones
|
by Kali Linux
cyber security
Introductory seminarNew
(Code:Kali-1) Latest Kali Linux compatible |
1 day (10:00-18:00)
|
Takeshita, who gives practical training and lectures at DEFCON Packet Capture Village in Las Vegas, will be holding an open cyber security seminar held by the Self-Defense Forces and the Ministry of Defense. You can actually run it and check it using PC, smartphone (Android), and Kali Linux.
|
★Distribution
・Kali Linux latest version ・Resume material ・CD-ROM ・USB memory Ikeriri bag ・Ikeriri magnet
★Lunch box
★Equipment used ・LAN cable/router ・Two PCs for each person (Kali Linux/Windows) ・One smartphone for each person (Android) ・Target (role role) Training server/protection server (Using a virtualized environment) ・Network environment ・Whiteboard ・Projector |
|
This is an introductory seminar on cybersecurity using Kali Linux, a Linux distribution for penetration testing. From the introduction of Kali Linux for penetration testing, to the basics of CLI operation, port scanning, system vulnerability inspection and intrusion, and remote control of smartphones, we will actually confirm attacks and defenses such as remote control of smartphones, and learn countermeasures. *In addition to GUI tools, the seminar will also include some CLI operations. It's okay if you're new to Linux, but we're targeting those who have at least one year of work experience, basic computer operations, and experience entering commands at a command prompt. We also recommend that you have basic knowledge of LAN and TCP/IP.
(Please note) This seminar is designed to learn cyber security attacks and countermeasures in a closed network for practical training.Actually, hacking into the external Internet violates the Unauthorized Access Act, as well as criminal and civil laws, and may result in punishment. This seminar is strictly a seminar to learn about actual cyber security attacks and take countermeasures. Please confirm and agree to this |
Types of cyber attacks and countermeasures Port scans and countermeasures whatweb / nmap System vulnerability research nmap / nikto / metasploit System intrusions and countermeasures metasploit armitage
(Note) This seminar is for learning cyber security attacks and countermeasures in a closed network for practical training.Hacking violates the Unauthorized Computer Access Act, as well as criminal and civil laws, and may be punished. This seminar is strictly a seminar to learn about cyber security attacks and take practical countermeasures. Please confirm and agree here
|
Information gathering on target sites burpsuite Privilege escalation tools and countermeasures mimikatz Remote control of smartphones and countermeasures
msf payload generator
(About the training environment) Attack and defense training will be conducted using a test PC, test smartphone, and test virtual server in a closed training network prepared here. Of course, you can bring your own PC or smartphone, but they will not be able to connect to the training network. You can use it by connecting to a separate wireless LAN from the training. |