The Complete Penetration Testing with Backbox Linux Course
Course Content:
Chapter 1: Introduction to Backbox
Chapter 2: Comparison between Kali Linux and Backbox
Chapter 3: Downloading and Installing Backbox
Chapter 4: Information Gathering Tools
Chapter 5: Vulnerability Assessment
Chapter 6: Exploitation
Chapter 7: Overview of Social Engineering Tools
Chapter 8: Sniffing and MTIM Attacks Tools
Chapter 9: Wireless Attacks Tools
Chapter 10: Case study: Performing Full Targeted Penetration Testing and Reporting
Note: Once you buy the course, you will be given access to the videos catalog in less than 12 hours.