Kali Linux Basics for Hackers

Learn the basics of the most used Linux distribution for hacking!
Rating: 3.9 out of 5 (61 ratings)
6,283 students
English
English [Auto]
Kali Linux Basics for Hackers
Rating: 3.9 out of 5 (61 ratings)
6,284 students
Basics of Kali Linux

Requirements

  • No pre-requisites

Description

If you’re getting started in the field of cybersecurity—especially in offensive security testing (penetration testing)—it’s likely that you’ll encounter the Kali Linux operating system. Kali Linux has a lot of features and tools that make a penetration tester’s or security engineer’s job a bit easier when they’re in the field or on a job. There are many tools, scripts, and frameworks for accomplishing various tasks, such as gathering information on a target, performing network scanning, and even exploitation, to name just a few. The challenge we face as beginners is learning about, and adapting to, a new environment.

In this course, we will be covering the following topics:

  • Linux Basics

  • Basic Network Configuration

  • Users and Group Management

  • Services Configuration

Who this course is for:

  • Beginner Linux students, OSCP takers

Course content

2 sections • 7 lectures • 1h 20m total length
  • Introduction
    04:34
  • Building a Lab: Virtual Box
    04:36
  • Deploying a Kali Linux VM
    07:43

Instructor

Founder, LufSec IT Security Consulting
Luciano Ferrari
  • 4.1 Instructor Rating
  • 261 Reviews
  • 8,440 Students
  • 3 Courses

Luciano Ferrari is an information security leader and IoT hacking expert.

Luciano holds multiple security certifications, including CISSP, CRISC, and CISM, and has worked at Fortune 500 companies in both technical and leadership roles. He drives progress at his own company, LufSec, where he works on security-related issues and projects.

Luciano has conducted hundreds of IT security audits and penetration tests, including audits and tests on IoT devices for cable companies. He has also leveraged his IT security expertise in manufacturing, semiconductor, financial, and educational institutions. With his background in electronics and microelectronics, his distinct specialization is definitely on hardware hacking. Luciano is passionate about sharing his knowledge with others and teaching.

His other areas of expertise include IT infrastructure, networking, penetration testing, risk, vulnerability, and threat management. In private, he enjoys researching new technologies and participating at security conferences and in bug bounty programs.