• Hacking with Kali Linux

  • The Practical Ethical Hackers Guide to Learn How to Protect Yourself from Cyber Attacks: Cybersecurity and Penetration Testing Tips Included
  • De: Steve Tudor
  • Narrado por: Russell Newton
  • Duración: 3 h y 4 m
  • 5.0 out of 5 stars (9 calificaciones)

Prime logotipo Exclusivo para miembros Prime: ¿Nuevo en Audible? Obtén 2 audiolibros gratis con tu prueba.
Elige 1 audiolibro al mes de nuestra inigualable colección.
Escucha todo lo que quieras de entre miles de audiolibros, Originals y podcasts incluidos.
Accede a ofertas y descuentos exclusivos.
Premium Plus se renueva automáticamente por $14.95 al mes después de 30 días. Cancela en cualquier momento.
Hacking with Kali Linux  Por  arte de portada

Hacking with Kali Linux

De: Steve Tudor
Narrado por: Russell Newton
Prueba por $0.00

US$14.95 al mes después de 30 días. Cancela en cualquier momento.

Compra ahora por US$14.95

Compra ahora por US$14.95

la tarjeta con terminación
Al confirmar tu compra, aceptas las Condiciones de Uso de Audible y el Aviso de Privacidad de Amazon. Impuestos a cobrar según aplique.

Resumen del Editor

Take the guesswork out of hacking and penetration testing with the ultimate guide to hacking with Kali Linux!

If you've always wanted to get into hacking but weren't sure where to start or ever trawled the web, looking for a reliable, easy-to-follow resource to help you get started with hacking or improve your skill set without much success, then look no further.

You've come to the right place.

In this guide, you're going to be exposed to the concept of hacking beyond the "hooded guy in a dark room tapping furiously at a backlit keyboard" stereotype. Using the powerful Kali Linux distribution, you're going to learn how to find loopholes and vulnerabilities in computer networks.

The insights contained in this guide are so powerful and we encourage you to use them for good, ethical, and white-hat reasons.

Here's a preview of what you're going to learn in Hacking with Kali Linux:

  • What being a "hacker" really means and the four types of hackers in today's cyberspace
  • A high-level overview of how hacking really works and how attackers cover their tracks
  • Why Kali Linux is the perfect operating system platform of choice if you want to become a hacker
  • Step-by-step instructions to install and set up Kali Linux with images
  • Six indispensable tools every modern hacker needs to have in their toolbox
  • How to choose the best programming languages to learn as a newbie hacker
  • How ethical and black hat hackers carry out reconnaissance and sniff out weaknesses in a computer network
  • Surefire ways to protect your computer system and network from malicious attacks
  • And much, much more...

Whether you're a fledgling hacker looking to get your feet wet, or you're a pro looking to upgrade your hacking skills, this guide will show you how to find your way into almost all "secure" computer networks.

Ready to begin your hacking journey? Scroll up and click the "Buy Now" button to get started today!"

©2019, 2020 Steve Tudor (P)2020 EP Enterprise Holding Limited
  • Versión completa Audiolibro

Lo que los oyentes dicen sobre Hacking with Kali Linux

Calificaciones medias de los clientes
Total
  • 5 out of 5 stars
  • 5 estrellas
    9
  • 4 estrellas
    0
  • 3 estrellas
    0
  • 2 estrellas
    0
  • 1 estrella
    0
Ejecución
  • 4.5 out of 5 stars
  • 5 estrellas
    3
  • 4 estrellas
    6
  • 3 estrellas
    0
  • 2 estrellas
    0
  • 1 estrella
    0
Historia
  • 4.5 out of 5 stars
  • 5 estrellas
    3
  • 4 estrellas
    6
  • 3 estrellas
    0
  • 2 estrellas
    0
  • 1 estrella
    0

Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.

Ordenar por:
Filtrar por:
  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    4 out of 5 stars

Love this book

This book is splendid. I inclined such huge numbers of successful things from this book. That was a very learnable book, I very interested in learning Hacking, this is a perfect book for me... I am following this book step by step instructions overall great information was found.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    4 out of 5 stars
  • Historia
    5 out of 5 stars

Informative book

The author did a good job presenting the material with helpful examples. Recommended to all for this hacking guide. Really helpful guide.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    4 out of 5 stars
  • Historia
    4 out of 5 stars

Good programming and cybersecurity book

This book is great for getting your feet wet on computer programming and cybersecurity. Lots of good information all in one place.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    4 out of 5 stars
  • Historia
    4 out of 5 stars

Fantastic Book

This book is fantastic! The Content of the book is very good. This book is simply easy and informative. I enjoy this book very much. Very useful information. I highly recommended this book.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    4 out of 5 stars
  • Historia
    5 out of 5 stars
El oyente recibió este título gratis

Good Book

Nice history of machine learning. Everything one needs to know about databases. Also, learn about hacking and how to keep your system safe.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    4 out of 5 stars

Great one

The plants by themselves from daughter with no guidance for human interference. It is the algorithm that is built in the system If the data provided for the algorithms is of poor quality and then the system is also of poor quality and Biased hence coma cleaning and recording.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    4 out of 5 stars
El oyente recibió este título gratis

Great book to start!

Great book to start your journey into computer programming. I look forward to learning more!

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    4 out of 5 stars
  • Historia
    4 out of 5 stars

Wow

This book is truly astounding. I am completely happy with this book. This book is entirely reasonable for amateurs. I exceptionally recommended this book to everybody.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

esto le resultó útil a 1 persona

  • Total
    5 out of 5 stars
  • Ejecución
    4 out of 5 stars
  • Historia
    5 out of 5 stars

Best

This is an incredible book about Kali Linux for Beginners. I read this book well overall. After perusing this book I learn numerous things about programmer essential Security, Networking Hacking, Kali Linux.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña