Learn Backtrack / kali linux

Backtrack / Kali Linux Course

If You are interested in doing Advance Backtrack / Kali Linux Course, than And Get in touch using the Contact Us form or you can directly email us at iitca.world@gmail.com or use the phone numbers to Contact Us. Call Now : +91 8564859199 , 8787206104.

Best Institute for Kali Linux Training Kali Linux or BackTrack has been widely used by the information security teams in various governmental and private organizations throughout the world to apply complete security to their online assets. But it is not easy software to understand and therefore requires proper training that enables you to completely understand the full features of BackTrack or Kali Linux.

IITCA in India for BackTrack Training on Live Projects: Indian Institute Of Technical Computer Application (IITCA) designed a complete course for Kali Linux that is being taught by the experts of Hackers. The expert at our institute has wide experience in security research, tool development, penetration testing etc. We also provide training on how to do Penetration testing using Kali Linux and this course is basically revolve around the Kali Linux distribution. There are very few institutes in Delhi that provide complete hands-on practice on Kali Linux but we are proud to announce that after the completion of our course, you would be able to get practical exposure. We also provide you the projects that have to be submitted by the students to gain the live exposure on Kali Linux software.

Complete Syllabus and Course of Kali Linux

  • Chapter 1:  Overview to the Tools of BackTrack & Kali Linux  
  • Chapter 2:  What is BackTrack and Kali Linux?  
  • Chapter 3:  How to install BackTrack on a Virtual Machine? 
  • Chapter 4:  Connecting backtrack to the Network  
  • Chapter 5:  Updating Software
  • Chapter 6: Using Integrated Help  
  • Chapter 7: BackTrack Wireless TX Power  
  • Chapter 8: Detecting Hidden SSIDs  
  • Chapter 9: How to Bypass MAC Address Filters? 
  • Chapter 10: Breaking WPA2 Wireless  
  • Chapter 11: Rogue Wireless Access Points  
  • Chapter 12: How to wireless Mis-Association Attacks?
  • Chapter 13: How to Use Nmap for Scanning?  
  • Chapter 14:  MITM Using Wireless Bridging
  • Chapter 15:   CDP Flooding  
  • Chapter 16:   DHCP Starvation  
  • Chapter 17: Metasploit Framework  
  • Chapter 18: ARP Spoofing MITM  
  • Chapter 19:  How to Create a "Pivot Point”?
  • Chapter 20: Social-Engineer Toolkit   SET)  
  • Chapter 21: Taking over HSRP  
  • Chapter 22: DNS Spoofing  
  • Chapter 23: Kali Linux  
  • Chapter 24: Maltego  
  • Chapter 25: Burp Suite  
  • Chapter 26: Raspberry Pi & Kali Linux  
  • Chapter 27:  DTP and 802.1q Attacks  
  • Chapter 28: PWNing a System with MSF 
  • Chapter 29: Ettercap and Xplico  
  • Chapter 30: Virtual Test Environment  
  • Chapter 31:  Wireshark  
  • Chapter 32:  Custom Password Lists  
  • Chapter 33: Hashes and Cracking Passwords  
  • Chapter 34: Rainbow Tables and Ophcrack  
  • Chapter 35:  Detecting Rootkits  


Distance Learning Fee

INR 2,500/- (Including Study Material + Videos + DVD + Software Kits).

Rules & Regulations

Rules & Payment Click Now...

Order Now

Distance Learning Kits

Go To             Order Now...

How To Payment Method

How To Make Payment

For Payment Rule: For Full Details, Click on View More Button

Like & Share Facebook Pages

Follow Now Twitter IITCA