
Kali Linux: The Definitive Guide to Ethical Hacking and Penetration Testing
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
$0.00 for first 30 days
Buy for $5.99
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Virtual Voice

This title uses virtual voice narration
About this listen
Understanding the basics of ethical hacking and penetration testing
Overview of the various tools included in Kali Linux, such as Nmap, Wireshark, and Metasploit
Hands-on tutorials and exercises to demonstrate the practical application of these tools.
Advanced topics such as wireless hacking, web application hacking, and exploitation techniques
Best practices and tips for ethical hacking and penetration testing
People who viewed this also viewed...
-
Hacking for Dummies, 7th Edition
- By: Kevin Beaver CISSP
- Narrated by: Tom Perkins
- Length: 11 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- By Amazon Customer on 12-25-22
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Linux Commands for Ethical Hacking Instructor Guide
- By: Kevin O'Neill
- Narrated by: Virtual Voice
- Length: 1 hr
- Unabridged
-
Overall
-
Performance
-
Story
The following instructor guide reviews core and key Linux commands for ethical hacking. These commands can be utilized for personal, educational, or corporate usage. It is envisioned that the instructor utilizes the material from this guide via a demonstration type format with each command reviewing the format, brief pros and cons and example. Command contents are grouped by high-level subject matter. Contents: Introduction How to Use and Run Commands Create Example File Exploitation Forensics and Analysis Network Scanning and Enumeration Vulnerability Assessment Process Conclusion About ...
By: Kevin O'Neill
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- By: Glen D. Singh
- Narrated by: Alex Freeman
- Length: 13 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
Lack of clarity
- By Anonymous on 01-30-25
By: Glen D. Singh
-
Learn Linux Quickly
- A Comprehensive Guide for Getting Up to Speed on the Linux Command Line (Ubuntu) (Crash Course with Hands-On Project)
- By: Code Quickly, Paul H. Bartley
- Narrated by: Helpful Matthew
- Length: 8 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Learn Linux Quickly takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell (or command line). Along the way, you'll learn the timeless skills handed down by generations of experienced, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching, and more. In addition to that practical knowledge, we reveal the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix mainframes of yore.
-
-
I am impressed by the way..
- By Christina V. Whiteman on 05-06-22
By: Code Quickly, and others
-
Hacking with Kali Linux: Penetration Testing
- A Beginner's Guide with Practical Examples to Learn How to Efficiently Perform Web Penetration Techniques, Exposing Vulnerabilities by Server Attacks
- By: Grzegorz Nowak
- Narrated by: Virtual Voice
- Length: 2 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
▶ Hacking is something that is taking over the world. ▶ With more and more people are moving online and doing almost any task that they can there, it is likely that hacking and other similar attacks are just going to increase over time. ▶ Our personal, financial, and business information is all found online, and this is a big goldmine for hackers all throughout the world. It is so important that we learn the best way to take care of our personal and financial information and to make sure that we are protected against any hacking attack that comes our way. And working with ...
By: Grzegorz Nowak
-
Hacking for Dummies, 7th Edition
- By: Kevin Beaver CISSP
- Narrated by: Tom Perkins
- Length: 11 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- By Amazon Customer on 12-25-22
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Linux Commands for Ethical Hacking Instructor Guide
- By: Kevin O'Neill
- Narrated by: Virtual Voice
- Length: 1 hr
- Unabridged
-
Overall
-
Performance
-
Story
The following instructor guide reviews core and key Linux commands for ethical hacking. These commands can be utilized for personal, educational, or corporate usage. It is envisioned that the instructor utilizes the material from this guide via a demonstration type format with each command reviewing the format, brief pros and cons and example. Command contents are grouped by high-level subject matter. Contents: Introduction How to Use and Run Commands Create Example File Exploitation Forensics and Analysis Network Scanning and Enumeration Vulnerability Assessment Process Conclusion About ...
By: Kevin O'Neill
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- By: Glen D. Singh
- Narrated by: Alex Freeman
- Length: 13 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
Lack of clarity
- By Anonymous on 01-30-25
By: Glen D. Singh
-
Learn Linux Quickly
- A Comprehensive Guide for Getting Up to Speed on the Linux Command Line (Ubuntu) (Crash Course with Hands-On Project)
- By: Code Quickly, Paul H. Bartley
- Narrated by: Helpful Matthew
- Length: 8 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Learn Linux Quickly takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell (or command line). Along the way, you'll learn the timeless skills handed down by generations of experienced, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching, and more. In addition to that practical knowledge, we reveal the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix mainframes of yore.
-
-
I am impressed by the way..
- By Christina V. Whiteman on 05-06-22
By: Code Quickly, and others
-
Hacking with Kali Linux: Penetration Testing
- A Beginner's Guide with Practical Examples to Learn How to Efficiently Perform Web Penetration Techniques, Exposing Vulnerabilities by Server Attacks
- By: Grzegorz Nowak
- Narrated by: Virtual Voice
- Length: 2 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
▶ Hacking is something that is taking over the world. ▶ With more and more people are moving online and doing almost any task that they can there, it is likely that hacking and other similar attacks are just going to increase over time. ▶ Our personal, financial, and business information is all found online, and this is a big goldmine for hackers all throughout the world. It is so important that we learn the best way to take care of our personal and financial information and to make sure that we are protected against any hacking attack that comes our way. And working with ...
By: Grzegorz Nowak