Free eBook: Learn Kali Linux 2019
Glen D. Singh, 550 pages, Nov 2019
- Get up and running with Kali Linux 2019.2
- Gain comprehensive insights into security concepts such as social engineering, wireless network exploitation, and web application attacks
- Learn to use Linux commands in the way ethical hackers do to gain control of your environment
DescriptionThe current trend of various hacking and security breaches displays how important it has become to pentest your environment, to ensure end point protection. This book will take you through the latest version of Kali Linux to efficiently deal with various crucial security aspects such as confidentiality, integrity, access control and authentication.
Register now to access this free eBook
Introduction to Hacking
Introduction to Hacking, introduces various types of threat actors and penetration testing methodologies and approaches.
Setting Up Kali - Part 1
Setting Up Kali - Part 1, introduces you to virtualization concepts, how to build your own penetration testing lab, how to install Kali Linux, and vulnerable target machines.
Setting Up Kali - Part 2
Setting Up Kali - Part 2, focuses on installing and configuring Windows and Ubuntu operating systems and troubleshooting Kali Linux.
Getting Comfortable with Kali Linux 2019
Getting Comfortable with Kali Linux 2019, teaches you about Kali Linux, its features, and commands to enable you to perform various tasks.
Passive Information Gathering
Passive Information Gathering, examines the passive ways to gather information pertaining to the target from Open Source Intelligence (OSINT), which means we will gather information about the target from publicly available resources.
Active Information Gathering
Active Information Gathering, explains the active ways of gathering information using DNS interrogation, scanning, and enumeration techniques.
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackers
Discover end-to-end penetration testing solutions to enhance your ethical hacking skills
Identify tools and techniques to secure and perform a penetration test on an AWS infrastructure using Kali Linux