My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
SAISOFT ENTERPRISES, INC DBA PROCAREER ACADEMY
Clerk
>
Contracts / Agreements
>
S
>
SAISOFT ENTERPRISES, INC DBA PROCAREER ACADEMY
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
8/19/2024 4:31:31 PM
Creation date
10/18/2023 3:01:36 PM
Metadata
Fields
Template:
Contracts
Company Name
SAISOFT ENTERPRISES, INC DBA PROCAREER ACADEMY
Contract #
A-2023-069-27
Agency
City Attorney's Office
Council Approval Date
5/2/2023
Expiration Date
6/30/2027
Insurance Exp Date
7/1/2024
Destruction Year
2032
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
170
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
Penetration Testing with Kali Linux <br />Program length: 40 hours (4 hours a day, two days a week for 5 weeks) <br />Instruction method: Distance <br />Program Description: Penetration Testing with Kali Linux introduces students to the latest ethical hacking <br />tools and techniques. You will learn to conduct a penetration test from start to finish through hands-on <br />experience within a target -rich, diverse, and vulnerable network environment. This is a very unique <br />course that combines traditional course materials teaching the latest ethical hacking tools and techniques <br />with hands-on simulations using a virtual lab environment. <br />Learning Objectives: <br />The course is designed to teach: <br />- Using multiple information gathering techniques to identify and enumerate targets running various <br />operating systems and services <br />- Ability to write basic scripts and tools to aid in the penetration testing process <br />- How to analyze, correct, modify, cross -compile, and port public exploit code <br />- Ability to successfully conduct both remote and client side attacks <br />- Ability to identify and exploit XSS, SQL injection, and file inclusion vulnerabilities in web applications <br />- Expertise in deploying tunneling techniques to bypass firewalls <br />Occupational Objectives: Successful graduates will be employable as Network Support professionals. <br />(SOC Code 15-1244) <br />Detailed Syllabus: <br />Passive Information Gathering - 3 hours <br />Active Information Gathering - 3 hours <br />Vulnerability Scanning - 3 hours <br />Buffer Overflows - 3 hours <br />Win32 and Linux Buffer Overflow Exploitation - 3 hours <br />Working with Exploits - 2 hours <br />File Transfers - 2 hours <br />Privilege Escalation - 3 hours <br />Client Side Attacks - 3 hours <br />Web Application Attacks - 3 hours <br />Password Attacks - 3 hours <br />Port Redirection and Tunneling - 3 hours <br />The Metasploit Framework - 3 hours <br />Bypassing Antivirus Software - 3 hours <br />Updated 091323 85 <br />
The URL can be used to link to this page
Your browser does not support the video tag.