If you’re getting started in the field of cybersecurity—especially in offensive security testing (penetration testing)—it’s likely that you’ll encounter the Kali Linux operating system. Kali Linux has a lot of features and tools that make a penetration tester’s or security engineer’s job a bit easier when they’re in the field or on a job. There are many tools, scripts, and frameworks for accomplishing various tasks, such as gathering information on a target, performing network scanning, and even exploitation, to name just a few. The challenge we face as beginners is learning about, and adapting to, a new environment.
In this course, we will be covering the following topics:
- Linux Basics
- Basic Network Configuration
- Users and Group Management
- Services Configuration
Take a Sneak Peek:
Introduction