Advanced Offensive Cyber Training using Kali Linux Attack Methods and Tools
In the 2-day KAMAT 2 course, students play the role of federal investigators, who have come together to analyze a single captured email. The email indicates that America is about to be attacked! There’s no added intelligence. And now you have only two days to track down and stop the international team of evil plotters that is behind the email. It’s time to fire up your Kali Linux attack stations and get to work. The stakes are high! Time is short! And it all occurs in real time. Good Luck!
KAMAT 2 applies the principles learned in its prerequisite KAMAT 1. In the 5-day KAMAT 1 course, students play the role of attackers whose assignment is to steal intellectual property from an American company. The purpose of KAMAT 1 is to teach the principles of Computer Network Exploitation (CNE). KAMAT 2 builds on KAMAT 1 to take students to exciting new levels.
Lab instruction and lecture topics include:
