Learning Kali Linux
Heads up! This course may be archived and/or unavailable.
Kali Linux is a flavor of Linux targeted at digital forensics experts and penetration (pen) testers. It includes over 400 pen-testing programs, and it is the primary tool used by ethical hackers. Using Kali Linux, certified ethical hackers can test networks on their organizations' behalves, to see if they're vulnerable to outside attacks.
Contents:
- Introduction
- 1. Setting Up the Virtual Lab
- 2. Introducing Kali
- 3. Information Gathering (Understanding the Target)
- 4. Vulnerability Analysis
- 5. Passwords and Hashes
- 6. Exploiting Targets
- Conclusion
Get a Reminder
Rating | Not enough ratings |
---|---|
Length | 2h 31m |
Starts | On Demand (Start anytime) |
Cost | $29/month (Access to entire library- free trial available) |
From | LinkedIn Learning |
Instructor | Malcolm Shore |
Download Videos | Only via the LinkedIn Learning mobile app |
Language | English |
Subjects | IT & Networking |
Tags | IT Operating Systems Security Linux Network Security Cybersecurity |
Get a Reminder
Similar Courses
Careers
An overview of related careers and their average salaries in the US. Bars indicate income percentile.
Unix - Linux - Splunk SME $67k
Unix/Linux Admin $67k
Linux Support Technican $72k
Linux Systems Administrator 4 $96k
Linux Systems Administrator / System Engineer $99k
SCO/Linux System Analyst $101k
Linux Systems Engineer 2 $108k
Linux/Unix Administrator Consultant $120k
Team Linux Admin Lead $123k
Linux Platform Engineer $125k
Unix/Linux System Engineer/Administrator $144k
Senior Linux Systems Administrator, Operations $212k
Write a review
Your opinion matters. Tell us what you think.
Please login to leave a review
Rating | Not enough ratings |
---|---|
Length | 2h 31m |
Starts | On Demand (Start anytime) |
Cost | $29/month (Access to entire library- free trial available) |
From | LinkedIn Learning |
Instructor | Malcolm Shore |
Download Videos | Only via the LinkedIn Learning mobile app |
Language | English |
Subjects | IT & Networking |
Tags | IT Operating Systems Security Linux Network Security Cybersecurity |
Similar Courses
Sorted by relevance
Like this course?
Here's what to do next:
- Save this course for later
- Get more details from the course provider
- Enroll in this course