
Kali Linux: The Definitive Guide to Ethical Hacking and Penetration Testing
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
$0.00 por los primeros 30 días
Compra ahora por $5.99
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
Virtual Voice

Este título utiliza narración de voz virtual
Acerca de esta escucha
Understanding the basics of ethical hacking and penetration testing
Overview of the various tools included in Kali Linux, such as Nmap, Wireshark, and Metasploit
Hands-on tutorials and exercises to demonstrate the practical application of these tools.
Advanced topics such as wireless hacking, web application hacking, and exploitation techniques
Best practices and tips for ethical hacking and penetration testing
Las personas que vieron esto también vieron...
-
Linux Commands for Ethical Hacking Instructor Guide
- De: Kevin O'Neill
- Narrado por: Virtual Voice
- Duración: 1 h
- Versión completa
-
General
-
Narración:
-
Historia
The following instructor guide reviews core and key Linux commands for ethical hacking. These commands can be utilized for personal, educational, or corporate usage. It is envisioned that the instructor utilizes the material from this guide via a demonstration type format with each command reviewing the format, brief pros and cons and example. Command contents are grouped by high-level subject matter. Contents: Introduction How to Use and Run Commands Create Example File Exploitation Forensics and Analysis Network Scanning and Enumeration Vulnerability Assessment Process Conclusion About ...
De: Kevin O'Neill
-
Hacking for Dummies, 7th Edition
- De: Kevin Beaver CISSP
- Narrado por: Tom Perkins
- Duración: 11 h y 34 m
- Versión completa
-
General
-
Narración:
-
Historia
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- De Amazon Customer en 12-25-22
-
Learn Linux Quickly
- A Comprehensive Guide for Getting Up to Speed on the Linux Command Line (Ubuntu) (Crash Course with Hands-On Project)
- De: Code Quickly, Paul H. Bartley
- Narrado por: Helpful Matthew
- Duración: 8 h y 27 m
- Versión completa
-
General
-
Narración:
-
Historia
Learn Linux Quickly takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell (or command line). Along the way, you'll learn the timeless skills handed down by generations of experienced, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching, and more. In addition to that practical knowledge, we reveal the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix mainframes of yore.
-
-
I am impressed by the way..
- De Christina V. Whiteman en 05-06-22
De: Code Quickly, y otros
-
Mastering Ethical Hacking
- Unleash Your Defensive Skills in the World of Ethical Hacking
- De: Barrett Williams, ChatGPT ChatGPT
- Narrado por: Virtual Voice
- Duración: 5 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
Introducing your go-to guide in the world of cybersecurity, "Mastering Ethical Hacking." This comprehensive, exciting, and instructive eBook takes you on a journey into the intriguing universe of ethical hacking. It aims to empower you with the knowledge and techniques to protect and secure virtual environments from the darker corners of the cyber world. There's an increasing need for ethical hackers in today's digital age, and this high-value guide introduces you to the fascinating world of ethical hacking and cybersecurity. Starting with a detailed understanding of the importance and role...
De: Barrett Williams, y otros
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- De: Glen D. Singh
- Narrado por: Alex Freeman
- Duración: 13 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
Lack of clarity
- De Anonymous en 01-30-25
De: Glen D. Singh
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- De: Roger A. Grimes
- Narrado por: Jonathan Todd Ross
- Duración: 10 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
-
-
Please stop reading the urls
- De Jonathan en 11-16-19
De: Roger A. Grimes
-
Linux Commands for Ethical Hacking Instructor Guide
- De: Kevin O'Neill
- Narrado por: Virtual Voice
- Duración: 1 h
- Versión completa
-
General
-
Narración:
-
Historia
The following instructor guide reviews core and key Linux commands for ethical hacking. These commands can be utilized for personal, educational, or corporate usage. It is envisioned that the instructor utilizes the material from this guide via a demonstration type format with each command reviewing the format, brief pros and cons and example. Command contents are grouped by high-level subject matter. Contents: Introduction How to Use and Run Commands Create Example File Exploitation Forensics and Analysis Network Scanning and Enumeration Vulnerability Assessment Process Conclusion About ...
De: Kevin O'Neill
-
Hacking for Dummies, 7th Edition
- De: Kevin Beaver CISSP
- Narrado por: Tom Perkins
- Duración: 11 h y 34 m
- Versión completa
-
General
-
Narración:
-
Historia
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- De Amazon Customer en 12-25-22
-
Learn Linux Quickly
- A Comprehensive Guide for Getting Up to Speed on the Linux Command Line (Ubuntu) (Crash Course with Hands-On Project)
- De: Code Quickly, Paul H. Bartley
- Narrado por: Helpful Matthew
- Duración: 8 h y 27 m
- Versión completa
-
General
-
Narración:
-
Historia
Learn Linux Quickly takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell (or command line). Along the way, you'll learn the timeless skills handed down by generations of experienced, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching, and more. In addition to that practical knowledge, we reveal the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix mainframes of yore.
-
-
I am impressed by the way..
- De Christina V. Whiteman en 05-06-22
De: Code Quickly, y otros
-
Mastering Ethical Hacking
- Unleash Your Defensive Skills in the World of Ethical Hacking
- De: Barrett Williams, ChatGPT ChatGPT
- Narrado por: Virtual Voice
- Duración: 5 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
Introducing your go-to guide in the world of cybersecurity, "Mastering Ethical Hacking." This comprehensive, exciting, and instructive eBook takes you on a journey into the intriguing universe of ethical hacking. It aims to empower you with the knowledge and techniques to protect and secure virtual environments from the darker corners of the cyber world. There's an increasing need for ethical hackers in today's digital age, and this high-value guide introduces you to the fascinating world of ethical hacking and cybersecurity. Starting with a detailed understanding of the importance and role...
De: Barrett Williams, y otros
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- De: Glen D. Singh
- Narrado por: Alex Freeman
- Duración: 13 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
Lack of clarity
- De Anonymous en 01-30-25
De: Glen D. Singh
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- De: Roger A. Grimes
- Narrado por: Jonathan Todd Ross
- Duración: 10 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
-
-
Please stop reading the urls
- De Jonathan en 11-16-19
De: Roger A. Grimes