Kali Linux v2 Training

IEHF Certified Kali Linux v2 Expert

Course Structure
Entery Requirements

Kali Linux is an advanced Penetration Testing and Security Auditing Linux distribution. Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrastructure has been put in place, all tools were reviewed and packaged, and we use Git for our VCS.

More than 300 penetration testing tools: After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either did not work or had other tools available that provided similar functionality.

Free and always will be: Kali Linux, like its predecessor, is completely free and always will be. You will never, ever have to pay for Kali Linux.

Open source Git tree: We are huge proponents of open source software and our development tree is available for all to see and all sources are available for those who wish to tweak and rebuild packages.

FHS compliant: Kali has been developed to adhere to the Filesystem Hierarchy Standard, allowing all Linux users to easily locate binaries, support files, libraries, etc.

Vast wireless device support: We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.

Custom kernel patched for injection: As penetration testers, the development team often needs to do wireless assessments so our kernel has the latest injection patches included.

Secure development environment: The Kali Linux team is made up of a small group of trusted individuals who can only commit packages and interact with the repositories while using multiple secure protocols.

GPG signed packages and repos: All Kali packages are signed by each individual developer when they are built and committed and the repositories subsequently sign the packages as well.

Multi-language: Although pentesting tools tend to be written in English, we have ensured that Kali has true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job.

Completely customizable: We completely understand that not everyone will agree with our design decisions so we have made it as easy as possible for our more adventurous users to customize Kali Linux to their liking, all the way down to the kernel.

ARMEL and ARMHF support: Since ARM-based systems are becoming more and more prevalent and inexpensive, we knew that Kali's ARM support would need to be as robust as we could manage, resulting in working installations for both ARMEL and ARMHF systems. Kali Linux has ARM repositories integrated with the mainline distribution so tools for ARM will be updated in conjunction with the rest of the distribution.

Advance Penetration Testing With Kali/BackTrack training covers:

  • Module 01: Introduction to Backtrack/Kali
  • Module 02: Information Gathering
  • Module 03: Open Source Information Gathering
  • Module 04: Port Scanning
  • Module 05: ARP Spoofing
  • Module 06: Buffer Overflow
  • Module 07: Working With Exploits
  • Module 08: Exploit Framework - Metasploit
  • Module 09: Password Attacks
  • Module 10: Web Application Attack Vectors
  • Module 11: Trojan Horses
  • Module 12: Rootkits
  • Module 13: Penetration Testing Standard/Methods
  • Module 14: Penetration Testing Classification - WB/BB/VA/PT
  • Module 15: DOS Attack
  • Module 16: Wireless Penetration Testing


  • Security Officers
  • Auditors
  • Network Administrators
  • Firewall Administrators
  • Security Professionals
  • Penetration Testers
  • Anyone who is concerned about the integrity of the network infrastructure

Exam Info

  • Number of Questions: 100
  • Passing Score: 70%
  • Test Duration: 4 Hours
  • Test Format: Multiple Choice


  • 60 Hours / 2 Months

Course reviews
  1. 4.00 out of 5

    Milan Sen

    The instructor is well versed in the attack/scanning techniques and mitigation steps.