Kali Linux Basics for Hackers


Summary, Description

It is possible that you will encounter the Kali Linux operating system if you start in the field of cybersecurity, especially in offensive security testing (penetration testing). Kali Linux has many features and resources that make it a little easier for a penetration tester or security engineer to work whether they’re in the field or at work. To achieve different tasks, there are several resources, scripts, and systems, such as collecting information on a destination, conducting network scanning, and even manipulation, to name a few. Learning from, and adapting to, a new world is the obstacle we face as beginners.

We will be discussing the following subjects in this course:

Basics in Linux

Configuring the Basic Network

Users and Controlling the Party

Configuring Networks

For whom this course is intended:

Beginner students of Linux, OSCP takers



Course Link