Summary, Description
It is possible that you will encounter the Kali Linux operating system if you start in the field of cybersecurity, especially in offensive security testing (penetration testing). Kali Linux has many features and resources that make it a little easier for a penetration tester or security engineer to work whether they’re in the field or at work. To achieve different tasks, there are several resources, scripts, and systems, such as collecting information on a destination, conducting network scanning, and even manipulation, to name a few. Learning from, and adapting to, a new world is the obstacle we face as beginners.
We will be discussing the following subjects in this course:
Basics in Linux
Configuring the Basic Network
Users and Controlling the Party
Configuring Networks
For whom this course is intended:
Beginner students of Linux, OSCP takers