Basic Security Testing With Kali Linux

Basic Security Testing with Kali Linux 2  eBooks & eLearning

Posted by bookwyrm at June 24, 2016
Basic Security Testing with Kali Linux 2

Basic Security Testing with Kali Linux 2 By Daniel W. Dieterle
2016 | 380 Pages | ISBN: 1530506565 | PDF (conv) | 16 MB

Basic Security Testing with Kali Linux  

Posted by FenixN at May 26, 2014
Basic Security Testing with Kali Linux

Basic Security Testing with Kali Linux
Language: English | AZW3 / EPUB / MOBI | ISBN-10: 1494861275 | ASIN: B00IJN5B4A | 2014 | 310 pages | 8 MB / 7 MB / 8 MB

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their security before the bad guys do.

Intermediate Security Testing with Kali Linux 2  

Posted by AlenMiler at Oct. 20, 2015
Intermediate Security Testing with Kali Linux 2

Intermediate Security Testing with Kali Linux 2 by Daniel W Dieterle
English | 25 Sept. 2015 | ISBN: 1516945867 | 494 Pages | True AZW3 (Kindle)/(EPUB/PDF conv) | 46.88 MB

Kali Linux 2 is the most advanced and feature rich penetration testing platform available. This hands-on learn by doing book will help take you beyond the basic features of Kali into a more advanced understanding of the tools and techniques used in security testing.

Web Penetration Testing with Kali Linux - Second Edition  eBooks & eLearning

Posted by Grev27 at Dec. 12, 2015
Web Penetration Testing with Kali Linux - Second Edition

Juned Ahmed Ansari, "Web Penetration Testing with Kali Linux - Second Edition"
English | ISBN: 1783988525 | 2015 | EPUB/PDF | 292 pages | 22 MB/11 MB
Udemy – Wireless Penetration Testing with Kali Linux & Raspberry Pi

Udemy – Wireless Penetration Testing with Kali Linux & Raspberry Pi
MP4 | Video: 1280x720 | 60 kbps | 44 KHz | Duration: 3 Hours | 795 MB
Genre: eLearning | Language: English

Use this small but powerful Raspberry Pi device in order to perform pen testing on your network or for clients.

Web Penetration Testing with Kali Linux  

Posted by nebulae at March 2, 2014
Web Penetration Testing with Kali Linux

Joseph Muniz, Aamir Lakhani, "Web Penetration Testing with Kali Linux"
English | ISBN: 1782163166 | 2013 | 321 pages | PDF (reup), EPUB | 64 MB

Web Penetration Testing with Kali Linux  

Posted by arundhati at Oct. 11, 2013
Web Penetration Testing with Kali Linux

Joseph Muniz, Aamir Lakhani, "Web Penetration Testing with Kali Linux"
2013 | ISBN-10: 1782163166 | 321 pages | PDF | 19,4 MB
Initiating to Ethical Hacking with Kali Linux (Make your own Free security virtual appliance)

Initiating to Ethical Hacking with Kali Linux 2016 (Make your own Free security virtual appliance) by Marc ARNAERT
English | March 28, 2016 | ASIN: B01DKHDCQS | 94 Pages | AZW3/MOBI/EPUB/PDF (conv) | 12.6 MB

In Cybersecurity, we must use technical security weapon to probe and infiltrate enemy. You can make your own tools, one by one, or you can have a complete hacking suite to understand how you enemy try to hack you.
Ethical Hacking With Kali Linux - Step By Step Installation

Ethical Hacking With Kali Linux - Step By Step Installation
MP4 | Video: 1280x720 | 59 kbps | 44 KHz | Duration: 2 Hours | 203 MB
Genre: eLearning | Language: English

Learn the Basics To Advanced Methods To Use Kali Linux For Security and Port Scanning Using NMAP

Pluralsight - Network Security Testing With NMAP  eBooks & eLearning

Posted by ParRus at Nov. 20, 2015
Pluralsight - Network Security Testing With NMAP

Pluralsight - Network Security Testing With NMAP
WEBRip | MP4 + Project Files | English | 1024 x 768 | AVC ~81.1 kbps | 15 fps
AAC | 102 Kbps | 44.1 KHz | 2 channels | 02:02:25 | 200.6 MB
Genre: Video Tutorial / IT & Software, Network & Security

NMAP is a powerful network scanning tool that can be used by a network administrator or security practitioner to audit a network. This course will lead the student through a discussion of NMAP's scanning phases and a discussion of the tool's capabilities and options for network, host, and service discovery. After completion of the course, the student will have a thorough knowledge of NMAP and be able to use it to effectively ensure the security of their network.