Advanced Offensive Cyber Training using Kali Linux Attack Methods and Tools

In the 2-day KAMAT 2 course, students play the role of federal investigators, who have come together to analyze a single captured email. The email indicates that America is about to be attacked! There’s no added intelligence. And now you have only two days to track down and stop the international team of evil plotters that is behind the email. It’s time to fire up your Kali Linux attack stations and get to work. The stakes are high! Time is short! And it all occurs in real time. Good Luck!

KAMAT 2 applies the principles learned in its prerequisite KAMAT 1. In the 5-day KAMAT 1 course, students play the role of attackers whose assignment is to steal intellectual property from an American company. The purpose of KAMAT 1 is to teach the principles of Computer Network Exploitation (CNE). KAMAT 2 builds on KAMAT 1 to take students to exciting new levels.

Lab instruction and lecture topics include:

  • Email-based exploitation using student-created malware
  • Advanced use of screen captures, keyloggers and file theft to collect IP and passwords.
  • Advanced use of Metasploit and its 2,000+ exploits to attack unpatched servers
  • Advanced use the Meterpreter payload and many of its 100+ exploitation commands
  • Advanced exploitation of Windows and Linux databases
  • Advanced exploitation of private networks
KAMAT_II_right

ATS is excited to offer availability for our 2-day KAMAT 2 course to our industry partners.

Classes are in person only, in ATS’s Reston headquarters.  Prerequisites are required. Cost is $1,500 per seat, but group discounts are available.  Please register at the link below!

  • December 17-18, 2024
  • February 25-26, 2025
  • April 15-16, 2025
  • June 10-11, 2025
  • August 5-6, 2025

Explore Other Courses