Introduction to Bash for Penetration Testers



This course teaches you to take your problem-solving capabilities to the next level with the Bash shell, to assess network and application-level security, and automating OSINT by leveraging the power of the Bash Shell available with Kali Linux.

The course begins by introducing some of the fundamental bash scripting and information processing tools. Building on this, the next few chapters focus on detailing ways to customize your Bash shell using functionalities that you will be able to follow as we go. The examples exposed on the course could be easily followed and added to your portfolio.

Take a Sneak Peek:


1.1 What can you do with Bash

1.2 Bash for Pentesting

Shopping Cart