Kali Linux Basics for Hackers
If you’re getting started in the field of cybersecurity—especially in offensive security testing (penetration testing)—it’s likely that you’ll encounter the Kali Linux operating system. Kali Linux has a lot of features and tools that make a penetration tester’s or security engineer’s job a bit easier when they’re in the field or on a job. There are many tools, scripts, and frameworks for accomplishing various tasks, such as gathering information on a target, performing network scanning, and even exploitation, to name just a few. The challenge we face as beginners is learning about, and adapting to, a new environment.
In this course, we will be covering the following topics:
Basic Network Configuration
Users and Group Management