Kali Linux Essential Training.
(eVideo)

Book Cover
Average Rating
Published
Carpenteria, CA linkedin.com, 2024.
Status

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

More Details

Format
eVideo
Language
English

Notes

General Note
1/30/202412:00:00AM
Participants/Performers
Presenter: Malcolm Shore
Description
Explore the tools you need to become a proficient ethical hacker: Kali Linux running in a VirtualBox environment, the Metasploitable system, and a Juice Shop website for testing.
Description
For ethical hackers, from beginners through to the most experienced professionals, Kali Linux provides the most effective platform from which to run penetration tests. In this course, cybersecurity expert Malcolm Shore introduces you to the set of tools necessary for efficient and effective ethical hacking: Kali Linux running in the VirtualBox environment, the Metasploitable system and an OWASP Juice Shop website to use as a target for testing. Explore the key tools in the Kali Linux toolset and find out how they can be used to carry out ethical hacking tests. Plus, learn about Vulnhub, hashcat for password cracking, the GVM (OpenVAS) vulnerability scanner, using hydra for password spraying, and more. This course helps you to become competent in the basic tools used for ethical hacking.
System Details
Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection.

Citations

APA Citation, 7th Edition (style guide)

Shore, M. (2024). Kali Linux Essential Training . linkedin.com.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Shore, Malcolm. 2024. Kali Linux Essential Training. linkedin.com.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Shore, Malcolm. Kali Linux Essential Training linkedin.com, 2024.

MLA Citation, 9th Edition (style guide)

Shore, Malcolm. Kali Linux Essential Training linkedin.com, 2024.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
3ee35580-c7d8-9307-5587-758a692243f1-eng
Go To Grouped Work

Grouping Information

Grouped Work ID3ee35580-c7d8-9307-5587-758a692243f1-eng
Full titlekali linux essential training
Authorshore malcolm
Grouping Categorymovie
Last Update2024-04-15 10:54:20AM
Last Indexed2024-05-18 23:25:06PM

Book Cover Information

Image Sourcesideload
First LoadedMay 2, 2024
Last UsedMay 2, 2024

Marc Record

First DetectedFeb 20, 2024 12:16:14 PM
Last File Modification TimeApr 15, 2024 11:00:47 AM

MARC Record

LEADER02288ngm a22003133i 4500
001LDC4510592
003LDC
00520240415154237.9
006m        c        
007cr cna       a
008240415s2024    cau168        o   vleng d
040 |a linkedin.com|b eng
050 4|a LDC4510592
1001 |a Shore, Malcolm|e speaker.
24510|a Kali Linux Essential Training.|c with Malcolm Shore
264 1|a Carpenteria, CA|b linkedin.com,|c 2024.
306 |a 02h:48m:58s
337 |a computer|2 rdamedia
338 |a online resource|2 rdacarrier
500 |a 1/30/202412:00:00AM
5111 |a Presenter: Malcolm Shore
520 |a Explore the tools you need to become a proficient ethical hacker: Kali Linux running in a VirtualBox environment, the Metasploitable system, and a Juice Shop website for testing.
520 |a For ethical hackers, from beginners through to the most experienced professionals, Kali Linux provides the most effective platform from which to run penetration tests. In this course, cybersecurity expert Malcolm Shore introduces you to the set of tools necessary for efficient and effective ethical hacking: Kali Linux running in the VirtualBox environment, the Metasploitable system and an OWASP Juice Shop website to use as a target for testing. Explore the key tools in the Kali Linux toolset and find out how they can be used to carry out ethical hacking tests. Plus, learn about Vulnhub, hashcat for password cracking, the GVM (OpenVAS) vulnerability scanner, using hydra for password spraying, and more. This course helps you to become competent in the basic tools used for ethical hacking.
538 |a Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection.
655 4|a Instructional films.|2 lcgft
655 4|a Educational films.|2 lcgft
7102 |a linkedin.com (Firm)
85640|u https://www.linkedin.com/learning/kali-linux-essential-training?u=103732282&auth=true|z View course details on linkedin.com/learning
85642|3 thumbnail|u https://media.licdn.com/dms/image/D560DAQFrjbckj0soVQ/learning-public-crop_288_512/0/1706316537221?e=2147483647&v=beta&t=8j5p65KrjIAHZqne2bRzhOFkiLnNJ-YMtP3fKPu0h2o