Kali Linux Essential Training.
(eVideo)
Author
Contributors
Published
Carpenteria, CA linkedin.com, 2024.
Status
Description
Loading Description...
Also in this Series
Checking series information...
More Details
Format
eVideo
Language
English
Notes
General Note
1/30/202412:00:00AM
Participants/Performers
Presenter: Malcolm Shore
Description
Explore the tools you need to become a proficient ethical hacker: Kali Linux running in a VirtualBox environment, the Metasploitable system, and a Juice Shop website for testing.
Description
For ethical hackers, from beginners through to the most experienced professionals, Kali Linux provides the most effective platform from which to run penetration tests. In this course, cybersecurity expert Malcolm Shore introduces you to the set of tools necessary for efficient and effective ethical hacking: Kali Linux running in the VirtualBox environment, the Metasploitable system and an OWASP Juice Shop website to use as a target for testing. Explore the key tools in the Kali Linux toolset and find out how they can be used to carry out ethical hacking tests. Plus, learn about Vulnhub, hashcat for password cracking, the GVM (OpenVAS) vulnerability scanner, using hydra for password spraying, and more. This course helps you to become competent in the basic tools used for ethical hacking.
System Details
Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection.
Citations
APA Citation, 7th Edition (style guide)
Shore, M. (2024). Kali Linux Essential Training . linkedin.com.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Shore, Malcolm. 2024. Kali Linux Essential Training. linkedin.com.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Shore, Malcolm. Kali Linux Essential Training linkedin.com, 2024.
MLA Citation, 9th Edition (style guide)Shore, Malcolm. Kali Linux Essential Training linkedin.com, 2024.
Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.
Staff View
Grouped Work ID
3ee35580-c7d8-9307-5587-758a692243f1-eng
Grouping Information
Grouped Work ID | 3ee35580-c7d8-9307-5587-758a692243f1-eng |
---|---|
Full title | kali linux essential training |
Author | shore malcolm |
Grouping Category | movie |
Last Update | 2024-04-15 10:54:20AM |
Last Indexed | 2024-05-18 23:25:06PM |
Book Cover Information
Image Source | sideload |
---|---|
First Loaded | May 2, 2024 |
Last Used | May 2, 2024 |
Marc Record
First Detected | Feb 20, 2024 12:16:14 PM |
---|---|
Last File Modification Time | Apr 15, 2024 11:00:47 AM |
MARC Record
LEADER | 02288ngm a22003133i 4500 | ||
---|---|---|---|
001 | LDC4510592 | ||
003 | LDC | ||
005 | 20240415154237.9 | ||
006 | m c | ||
007 | cr cna a | ||
008 | 240415s2024 cau168 o vleng d | ||
040 | |a linkedin.com|b eng | ||
050 | 4 | |a LDC4510592 | |
100 | 1 | |a Shore, Malcolm|e speaker. | |
245 | 1 | 0 | |a Kali Linux Essential Training.|c with Malcolm Shore |
264 | 1 | |a Carpenteria, CA|b linkedin.com,|c 2024. | |
306 | |a 02h:48m:58s | ||
337 | |a computer|2 rdamedia | ||
338 | |a online resource|2 rdacarrier | ||
500 | |a 1/30/202412:00:00AM | ||
511 | 1 | |a Presenter: Malcolm Shore | |
520 | |a Explore the tools you need to become a proficient ethical hacker: Kali Linux running in a VirtualBox environment, the Metasploitable system, and a Juice Shop website for testing. | ||
520 | |a For ethical hackers, from beginners through to the most experienced professionals, Kali Linux provides the most effective platform from which to run penetration tests. In this course, cybersecurity expert Malcolm Shore introduces you to the set of tools necessary for efficient and effective ethical hacking: Kali Linux running in the VirtualBox environment, the Metasploitable system and an OWASP Juice Shop website to use as a target for testing. Explore the key tools in the Kali Linux toolset and find out how they can be used to carry out ethical hacking tests. Plus, learn about Vulnhub, hashcat for password cracking, the GVM (OpenVAS) vulnerability scanner, using hydra for password spraying, and more. This course helps you to become competent in the basic tools used for ethical hacking. | ||
538 | |a Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection. | ||
655 | 4 | |a Instructional films.|2 lcgft | |
655 | 4 | |a Educational films.|2 lcgft | |
710 | 2 | |a linkedin.com (Firm) | |
856 | 4 | 0 | |u https://www.linkedin.com/learning/kali-linux-essential-training?u=103732282&auth=true|z View course details on linkedin.com/learning |
856 | 4 | 2 | |3 thumbnail|u https://media.licdn.com/dms/image/D560DAQFrjbckj0soVQ/learning-public-crop_288_512/0/1706316537221?e=2147483647&v=beta&t=8j5p65KrjIAHZqne2bRzhOFkiLnNJ-YMtP3fKPu0h2o |