Learning Kali Linux

Start my 1-month free trial
  • Course details

    Kali Linux is a flavor of Linux targeted at digital forensics experts and penetration (pen) testers. It includes over 400 pen-testing programs, and it is the primary tool used by ethical hackers. Using Kali Linux, certified ethical hackers can test networks on their organizations' behalves, to see if they're vulnerable to outside attacks.

    This course will give prospective ethical hackers a short overview of the tools in Kali Linux. Cybersecurity expert Malcolm Shore shows how to set up a virtual environment for testing, configure Kali Linux, and install toolsets for information gathering, vulnerability assessment, password and hash cracking, and target exploitation.

    Because businesses are connected, they are also exposed. Vulnerability testing helps organizations limit that exposure. This course will help you explore the careers, techniques, and tools behind ethical hacking—one of the most competitive and sought-after IT security skills.

    Instructor

    • Click here to view Malcolm Shore’s instructor page

      Malcolm Shore

      Chief Security Architect

      • Malcolm Shore is a cybersecurity expert who spent ten years as a director at New Zealand's GCSB.

        Dr. Shore was the principal security officer at the Australian National Broadband Network 乐虎体育在线 and the director of education and community relations for the Australian Information Security Association. He's currently a technical director at BAE Systems Applied Intelligence, and an educator in the fields of forensics, information warfare, security management, and applied cryptography. He holds a PhD in information security.

    Skills covered in this course

  • Welcome

    - [Voiceover] Everyday, we hear of another data breach. Big or small, public or private. In the digital world, business is connected. And that means it's exposed. I'm Malcolm Shore, and I've spent a career helping government and businesses protect their systems. Minimizing the risk of being today's data breach means testing systems thoroughly, before they go online. And that's the role of the penetration tester. The tool most commonly used to do this testing is Kali Linux. In this course I'll explore how we can use Kali Linux to test systems for weaknesses. We'll look at how to establish a virtual network of systems to use as a learning environment for Kali. And we'll look at the Kali system and I'll demonstrate some of the tools provided by Kali for testing system. I'll start by taking a look at Oracle's VirtualBox environment. And I'll build a network of testing target. I'll then describe to Kali operating system in this extensive set of tools for information gathering and system…

  • Download courses and learn on the go

    乐虎体育在线 Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.

    Watch this course anytime, anywhere. Get started with a free trial today.

Contents