1. Target
  2. Movies, Music & Books
  3. Books
  4. Non-Fiction

Kali Linux - by Berg Craig (Paperback)

Kali Linux - by  Berg Craig (Paperback)
Store: Target
Last Price: 10.99 USD

Similar Products

Products of same category from the store

All

Product info

<p/><br></br><p><b> About the Book </b></p></br></br>You are about to discover how to start hacking with the #1 hacking tool, Kali Linux, in no time, even if you've never hacked before!<p/><br></br><p><b> Book Synopsis </b></p></br></br><p><strong>You are about to discover how to start hacking with the #1 hacking tool, Kali Linux, in no time, even if you've never hacked before!</strong></p><p>Kali Linux is the <strong>king of all penetration testing tools</strong> out there. But <em>while its <strong>600+ pre-installed tools and utilities are meant to make penetration testing and forensics easy</strong>, at first, it can be overwhelming for experienced and aspiring security professionals to decide which tool to use to conduct a specific penetration test</em>.</p><p>That's where this <strong>book comes in to streamline your learning experience</strong>! If you are uncertain about where to begin even after reading and watching tons of free information online, <strong>this book will give you the much needed structure to go all</strong> in into the world of ethical hacking into secure computer systems with the best tool for the job.</p><p>Since its introduction in 2012 <strong><em>as a successor to the previous version, Back Track Linux, </em></strong> Kali Linux has grown in popularity and capabilities to become the <strong><em>go-to open source security tool for information security professionals around the world</em></strong>.</p><p>And <em>this book will show you how to use it like the pros use it even if you've never stepped into a formal Kali Linux class before</em>!</p><p><strong>In this book, we are going to cover the major features & tools provided by Kali Linux, including: </strong></p><ul><li>Downloading, installation and set up</li><li>Information gathering tools</li><li><strong>Vulnerability assessment</strong></li><li>Wireless attacks</li><li><strong>Web application attacks</strong></li><li>Exploitation tools</li><li><strong>Forensics tools</strong></li><li>Sniffing and spoofing</li><li><strong>Password cracking</strong></li><li>Maintaining access</li><li><strong>Social engineering tools</strong></li><li>Reverse engineering tools</li><li><strong>Hardware hacking tools</strong></li><li>Reporting tools</li><li><strong>Denial of service attacks</strong></li><li>And much more!</li></ul></p>

Price History