Training Penetration testing using Python and Kali Linux
Practical information about training
- CATEGORY: Security
- SUBCATEGORY: Governance, Risk and Compliance (GRC)
- TRAINING CODE: SC-ZR-171
- DURATION: 2 days
- PRICE INFORMATION from: 1950 PLN net
- LANGUAGE OF TRAINING: polish
- FORM OF IMPLEMENTATION: stationary, online
Training description
A hands-on training course combining Python programming skills with security testing of information systems. Participants will learn techniques for creating their own penetration testing tools and learn how to use existing Python libraries in the Kali Linux environment. The training is in a workshop format, where theory is immediately translated into practice in a secure lab environment.
Participant profile
- IT security specialists
- System administrators interested in security
- Programmers looking to expand into security
- Pentesters looking to extend their tools with custom scripts
- IT systems security auditors
- DevSecOps engineers
Agenda
- Fundamentals of penetration testing
- Penetration testing methodologies
- Test environment configuration
- Kali Linux Tools
- Automation using Python
- Creating tools for recognition
- Network scanning
- Enumeration of systems
- Gathering host information
- Vulnerability analysis
- Exploitation of systems
- Creating exploits in Python
- Use of existing exploits
- Post-exploitation
- Securing access
- Reporting and documentation
- Automatic report generation
- Documenting vulnerabilities found
- Create custom reporting tools
- Presentation of test results
Benefits
The participant will gain the ability to create their own penetration testing tools in Python. He or she will learn to effectively use the Kali Linux environment in conjunction with his or her own scripts. Will learn techniques for automating security testing processes. Will be able to create advanced scripts for scanning and analyzing system security. Will develop skills in documenting and reporting the results of penetration testing. Will gain a working knowledge of penetration testing methodologies.
Required preparation of participants
- Basic knowledge of the Python language
- Knowledge of the basics of computer networks
- General knowledge of IT security
- Basic knowledge of Linux systems
Issues
- Penetration testing methodologies
- Programming security tools
- Security test automation
- Scanning and enumeration
- Exploits and their creation
- Post-exploitation
- Secure test environment
- Kali Linux and its tools
- Python libraries for pentesting
- Information gathering techniques
- Reporting of results
- Test documentation
Do you have any questions?
Feel free to contact us.
Justyna Kalbarczyk
+48 516 098 221
justyna.kalbarczyk@eitt.pl
31 Ząbkowska Street 03-736 Warsaw
Forms of training delivery
Stationary training
- Training at the customer's premises or at a designated location
- Training room equipped with the necessary equipment
- Training materials in electronic form
- Coffee breaks and lunch
- Direct interaction with the trainer
- Networking in a group
- Workshop exercises in teams
Remote training
- Virtual training environment
- Electronic materials
- Interactive online exercises
- Breakout rooms for group work
- Technical support during the training
- Recordings of the session (optional)
Possibility of funding
The training can be financed with public funds under:
- National Training Fund (KFS)
- Development Services Base (BUR)
- EU projects implemented by PARP
- HR Academy Program (PARP)
- Regional operational programs
If you are interested in funding, our team will help you prepare the required documentation.
HAVE A QUESTION?
Contact us for more information about our training, programs and cooperation. We will be happy to answer all your inquiries!
They trusted us
Get to know our company

Do you have any questions?
Feel free to contact us.
Justyna Kalbarczyk
+48 516 098 221
justyna.kalbarczyk@eitt.pl
31 Ząbkowska Street 03-736 Warsaw
FAQ - Frequently Asked Questions
- One-pager invitation with deadlines
- Project kick-off
- Strategic leadership and thinking
- Communication and Cooperation. Conflict management
- Motivating, engaging and difficult decisions in business
- Managing Change and Innovation. Leadership in crisis
- Building the organization of the future
- Best practices workshop - retrospective; creating a coherent program for middle and lower management levels























