Kali Linux Basics for Hackers
Requirements
- No pre-requisites
Description
If you’re getting started in the field of cybersecurity—especially in offensive security testing (penetration testing)—it’s likely that you’ll encounter the Kali Linux operating system. Kali Linux has a lot of features and tools that make a penetration tester’s or security engineer’s job a bit easier when they’re in the field or on a job. There are many tools, scripts, and frameworks for accomplishing various tasks, such as gathering information on a target, performing network scanning, and even exploitation, to name just a few. The challenge we face as beginners is learning about, and adapting to, a new environment.
In this course, we will be covering the following topics:
Linux Basics
Basic Network Configuration
Users and Group Management
Services Configuration
Who this course is for:
- Beginner Linux students, OSCP takers
Course content
- 04:34Introduction
- 04:36Building a Lab: Virtual Box
- 07:43Deploying a Kali Linux VM
Instructor
Luciano Ferrari is an information security leader and IoT hacking expert.
Luciano holds multiple security certifications, including CISSP, CRISC, and CISM, and has worked at Fortune 500 companies in both technical and leadership roles. He drives progress at his own company, LufSec, where he works on security-related issues and projects.
Luciano has conducted hundreds of IT security audits and penetration tests, including audits and tests on IoT devices for cable companies. He has also leveraged his IT security expertise in manufacturing, semiconductor, financial, and educational institutions. With his background in electronics and microelectronics, his distinct specialization is definitely on hardware hacking. Luciano is passionate about sharing his knowledge with others and teaching.
His other areas of expertise include IT infrastructure, networking, penetration testing, risk, vulnerability, and threat management. In private, he enjoys researching new technologies and participating at security conferences and in bug bounty programs.