
Kali Linux: The Definitive Guide to Ethical Hacking and Penetration Testing
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
Compra ahora por $5.99
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
Virtual Voice

Este título utiliza narración de voz virtual
Acerca de esta escucha
Understanding the basics of ethical hacking and penetration testing
Overview of the various tools included in Kali Linux, such as Nmap, Wireshark, and Metasploit
Hands-on tutorials and exercises to demonstrate the practical application of these tools.
Advanced topics such as wireless hacking, web application hacking, and exploitation techniques
Best practices and tips for ethical hacking and penetration testing
Las personas que vieron esto también vieron...
-
Linux Commands for Ethical Hacking Instructor Guide
- De: Kevin O'Neill
- Narrado por: Virtual Voice
- Duración: 1 h
- Versión completa
-
General
-
Narración:
-
Historia
The following instructor guide reviews core and key Linux commands for ethical hacking. These commands can be utilized for personal, educational, or corporate usage. It is envisioned that the instructor utilizes the material from this guide via a demonstration type format with each command reviewing the format, brief pros and cons and example. Command contents are grouped by high-level subject matter. Contents: Introduction How to Use and Run Commands Create Example File Exploitation Forensics and Analysis Network Scanning and Enumeration Vulnerability Assessment Process Conclusion About ...
De: Kevin O'Neill
-
Hacking for Dummies, 7th Edition
- De: Kevin Beaver CISSP
- Narrado por: Tom Perkins
- Duración: 11 h y 34 m
- Versión completa
-
General
-
Narración:
-
Historia
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- De Amazon Customer en 12-25-22
-
Learn Linux Quickly
- A Comprehensive Guide for Getting Up to Speed on the Linux Command Line (Ubuntu) (Crash Course with Hands-On Project)
- De: Code Quickly, Paul H. Bartley
- Narrado por: Helpful Matthew
- Duración: 8 h y 27 m
- Versión completa
-
General
-
Narración:
-
Historia
Learn Linux Quickly takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell (or command line). Along the way, you'll learn the timeless skills handed down by generations of experienced, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching, and more. In addition to that practical knowledge, we reveal the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix mainframes of yore.
-
-
I am impressed by the way..
- De Christina V. Whiteman en 05-06-22
De: Code Quickly, y otros
-
Mastering Ethical Hacking
- Unleash Your Defensive Skills in the World of Ethical Hacking
- De: Barrett Williams, ChatGPT ChatGPT
- Narrado por: Virtual Voice
- Duración: 5 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
Introducing your go-to guide in the world of cybersecurity, "Mastering Ethical Hacking." This comprehensive, exciting, and instructive eBook takes you on a journey into the intriguing universe of ethical hacking. It aims to empower you with the knowledge and techniques to protect and secure virtual environments from the darker corners of the cyber world. There's an increasing need for ethical hackers in today's digital age, and this high-value guide introduces you to the fascinating world of ethical hacking and cybersecurity. Starting with a detailed understanding of the importance and role...
De: Barrett Williams, y otros
-
CompTIA Linux+ (Plus) Certification: The Ultimate Study Guide to Ace the Exam
- De: Jake T Mills
- Narrado por: Tom Brooks
- Duración: 5 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
In the dynamic landscape of technology, familiarity with Linux has become increasingly indispensable. Our book offers a comprehensive exploration of the Linux operating system, tailored for both beginners and seasoned users seeking to deepen their understanding and refine their skills. With a blend of theoretical knowledge and practical applications, this book serves as a valuable resource for anyone looking to navigate the complexities of Linux effectively.
-
-
Inaccurate and repetitive
- De J&D-T en 06-10-25
De: Jake T Mills
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- De: Glen D. Singh
- Narrado por: Alex Freeman
- Duración: 13 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
Lack of clarity
- De Anonymous en 01-30-25
De: Glen D. Singh
-
Linux Commands for Ethical Hacking Instructor Guide
- De: Kevin O'Neill
- Narrado por: Virtual Voice
- Duración: 1 h
- Versión completa
-
General
-
Narración:
-
Historia
The following instructor guide reviews core and key Linux commands for ethical hacking. These commands can be utilized for personal, educational, or corporate usage. It is envisioned that the instructor utilizes the material from this guide via a demonstration type format with each command reviewing the format, brief pros and cons and example. Command contents are grouped by high-level subject matter. Contents: Introduction How to Use and Run Commands Create Example File Exploitation Forensics and Analysis Network Scanning and Enumeration Vulnerability Assessment Process Conclusion About ...
De: Kevin O'Neill
-
Hacking for Dummies, 7th Edition
- De: Kevin Beaver CISSP
- Narrado por: Tom Perkins
- Duración: 11 h y 34 m
- Versión completa
-
General
-
Narración:
-
Historia
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- De Amazon Customer en 12-25-22
-
Learn Linux Quickly
- A Comprehensive Guide for Getting Up to Speed on the Linux Command Line (Ubuntu) (Crash Course with Hands-On Project)
- De: Code Quickly, Paul H. Bartley
- Narrado por: Helpful Matthew
- Duración: 8 h y 27 m
- Versión completa
-
General
-
Narración:
-
Historia
Learn Linux Quickly takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell (or command line). Along the way, you'll learn the timeless skills handed down by generations of experienced, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching, and more. In addition to that practical knowledge, we reveal the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix mainframes of yore.
-
-
I am impressed by the way..
- De Christina V. Whiteman en 05-06-22
De: Code Quickly, y otros
-
Mastering Ethical Hacking
- Unleash Your Defensive Skills in the World of Ethical Hacking
- De: Barrett Williams, ChatGPT ChatGPT
- Narrado por: Virtual Voice
- Duración: 5 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
Introducing your go-to guide in the world of cybersecurity, "Mastering Ethical Hacking." This comprehensive, exciting, and instructive eBook takes you on a journey into the intriguing universe of ethical hacking. It aims to empower you with the knowledge and techniques to protect and secure virtual environments from the darker corners of the cyber world. There's an increasing need for ethical hackers in today's digital age, and this high-value guide introduces you to the fascinating world of ethical hacking and cybersecurity. Starting with a detailed understanding of the importance and role...
De: Barrett Williams, y otros
-
CompTIA Linux+ (Plus) Certification: The Ultimate Study Guide to Ace the Exam
- De: Jake T Mills
- Narrado por: Tom Brooks
- Duración: 5 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
In the dynamic landscape of technology, familiarity with Linux has become increasingly indispensable. Our book offers a comprehensive exploration of the Linux operating system, tailored for both beginners and seasoned users seeking to deepen their understanding and refine their skills. With a blend of theoretical knowledge and practical applications, this book serves as a valuable resource for anyone looking to navigate the complexities of Linux effectively.
-
-
Inaccurate and repetitive
- De J&D-T en 06-10-25
De: Jake T Mills
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- De: Glen D. Singh
- Narrado por: Alex Freeman
- Duración: 13 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
Lack of clarity
- De Anonymous en 01-30-25
De: Glen D. Singh