
Kali Linux: The Definitive Guide to Ethical Hacking and Penetration Testing
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
$0.00 por los primeros 30 días
Compra ahora por $5.99
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
Virtual Voice

Este título utiliza narración de voz virtual
Acerca de esta escucha
Understanding the basics of ethical hacking and penetration testing
Overview of the various tools included in Kali Linux, such as Nmap, Wireshark, and Metasploit
Hands-on tutorials and exercises to demonstrate the practical application of these tools.
Advanced topics such as wireless hacking, web application hacking, and exploitation techniques
Best practices and tips for ethical hacking and penetration testing
Las personas que vieron esto también vieron...
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
Hacking for Dummies, 7th Edition
- De: Kevin Beaver CISSP
- Narrado por: Tom Perkins
- Duración: 11 h y 34 m
- Versión completa
-
General
-
Narración:
-
Historia
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- De Amazon Customer en 12-25-22
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- De: Glen D. Singh
- Narrado por: Alex Freeman
- Duración: 13 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
Lack of clarity
- De Anonymous en 01-30-25
De: Glen D. Singh
-
Linux Commands for Ethical Hacking Instructor Guide
- De: Kevin O'Neill
- Narrado por: Virtual Voice
- Duración: 1 h
- Versión completa
-
General
-
Narración:
-
Historia
The following instructor guide reviews core and key Linux commands for ethical hacking. These commands can be utilized for personal, educational, or corporate usage. It is envisioned that the instructor utilizes the material from this guide via a demonstration type format with each command reviewing the format, brief pros and cons and example. Command contents are grouped by high-level subject matter. Contents: Introduction How to Use and Run Commands Create Example File Exploitation Forensics and Analysis Network Scanning and Enumeration Vulnerability Assessment Process Conclusion About ...
De: Kevin O'Neill
-
Kali Linux for Beginners
- Computer Hacking & Programming Guide with Practical Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Basics of Cyber Security
- De: Learn Computer Hacking in Deep
- Narrado por: Jowanna Lewis
- Duración: 3 h y 23 m
- Versión completa
-
General
-
Narración:
-
Historia
Most of the big companies today seek the help of Kali Linux for the purpose of tracing and checking the various forms of vulnerabilities which are present within a system and thus ensures 100 percent security for an organization. Unless and until you are unaware of the basics, you will not be able to use this software. In fact, for carrying out an effective form of ethical hacking, you will need to learn about the various attacks along with the forms of networks. You can easily find the information in this audiobook.
-
-
KLCP TRAINING
- De Suwan Lechowicz en 03-16-20
-
Cybersecurity All-in-One for Dummies
- De: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, y otros
- Narrado por: Tom Perkins
- Duración: 24 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems—and explains why doing so is more important now than ever.
-
-
Great book
- De KatieLynn en 10-08-24
De: Joseph Steinberg, y otros
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
Hacking for Dummies, 7th Edition
- De: Kevin Beaver CISSP
- Narrado por: Tom Perkins
- Duración: 11 h y 34 m
- Versión completa
-
General
-
Narración:
-
Historia
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- De Amazon Customer en 12-25-22
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- De: Glen D. Singh
- Narrado por: Alex Freeman
- Duración: 13 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
Lack of clarity
- De Anonymous en 01-30-25
De: Glen D. Singh
-
Linux Commands for Ethical Hacking Instructor Guide
- De: Kevin O'Neill
- Narrado por: Virtual Voice
- Duración: 1 h
- Versión completa
-
General
-
Narración:
-
Historia
The following instructor guide reviews core and key Linux commands for ethical hacking. These commands can be utilized for personal, educational, or corporate usage. It is envisioned that the instructor utilizes the material from this guide via a demonstration type format with each command reviewing the format, brief pros and cons and example. Command contents are grouped by high-level subject matter. Contents: Introduction How to Use and Run Commands Create Example File Exploitation Forensics and Analysis Network Scanning and Enumeration Vulnerability Assessment Process Conclusion About ...
De: Kevin O'Neill
-
Kali Linux for Beginners
- Computer Hacking & Programming Guide with Practical Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Basics of Cyber Security
- De: Learn Computer Hacking in Deep
- Narrado por: Jowanna Lewis
- Duración: 3 h y 23 m
- Versión completa
-
General
-
Narración:
-
Historia
Most of the big companies today seek the help of Kali Linux for the purpose of tracing and checking the various forms of vulnerabilities which are present within a system and thus ensures 100 percent security for an organization. Unless and until you are unaware of the basics, you will not be able to use this software. In fact, for carrying out an effective form of ethical hacking, you will need to learn about the various attacks along with the forms of networks. You can easily find the information in this audiobook.
-
-
KLCP TRAINING
- De Suwan Lechowicz en 03-16-20
-
Cybersecurity All-in-One for Dummies
- De: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, y otros
- Narrado por: Tom Perkins
- Duración: 24 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems—and explains why doing so is more important now than ever.
-
-
Great book
- De KatieLynn en 10-08-24
De: Joseph Steinberg, y otros
-
Learn Linux Quickly
- A Comprehensive Guide for Getting Up to Speed on the Linux Command Line (Ubuntu) (Crash Course with Hands-On Project)
- De: Code Quickly, Paul H. Bartley
- Narrado por: Helpful Matthew
- Duración: 8 h y 27 m
- Versión completa
-
General
-
Narración:
-
Historia
Learn Linux Quickly takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell (or command line). Along the way, you'll learn the timeless skills handed down by generations of experienced, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching, and more. In addition to that practical knowledge, we reveal the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix mainframes of yore.
-
-
I am impressed by the way..
- De Christina V. Whiteman en 05-06-22
De: Code Quickly, y otros
-
The Ethical Hacking Book for Beginners
- A Step by Step Guide for you to Learn the Fundamentals of Ethical Hacking and CyberSecurity
- De: Ramon Nastase
- Narrado por: Virtual Voice
- Duración: 2 h y 44 m
- Versión completa
-
General
-
Narración:
-
Historia
Ever wondered how a Hacker thinks? Or how you could become a Hacker? This book will show you how Hacking works. You will have a chance to understand how attackers gain access to your systems and steal information. Also, you will learn what you need to do to protect yourself from cyber threats and the most common hacking techniques used today. Here's what you'll learn from this security book: The type of hackers How the process of Hacking works and how attackers cover their traces How to install and use Kali Linux The basics of CyberSecurity All the information on malware and cyber attacks ...
-
-
great
- De Kevin H. en 06-05-25
De: Ramon Nastase
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- De: Phillip L. Wylie, Kim Crawley
- Narrado por: Matthew Josdal
- Duración: 6 h y 22 m
- Versión completa
-
General
-
Narración:
-
Historia
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
-
-
Excellent book!
- De Jennifer Langford en 08-27-21
De: Phillip L. Wylie, y otros
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- De: Roger A. Grimes
- Narrado por: Jonathan Todd Ross
- Duración: 10 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
-
-
Please stop reading the urls
- De Jonathan en 11-16-19
De: Roger A. Grimes
-
Hacking with Kali Linux: Penetration Testing
- A Beginner's Guide with Practical Examples to Learn How to Efficiently Perform Web Penetration Techniques, Exposing Vulnerabilities by Server Attacks
- De: Grzegorz Nowak
- Narrado por: Virtual Voice
- Duración: 2 h y 49 m
- Versión completa
-
General
-
Narración:
-
Historia
▶ Hacking is something that is taking over the world. ▶ With more and more people are moving online and doing almost any task that they can there, it is likely that hacking and other similar attacks are just going to increase over time. ▶ Our personal, financial, and business information is all found online, and this is a big goldmine for hackers all throughout the world. It is so important that we learn the best way to take care of our personal and financial information and to make sure that we are protected against any hacking attack that comes our way. And working with ...
De: Grzegorz Nowak
-
Hackers: Heroes of the Computer Revolution
- 25th Anniversary Edition
- De: Steven Levy
- Narrado por: Mike Chamberlain
- Duración: 20 h y 23 m
- Versión completa
-
General
-
Narración:
-
Historia
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
-
-
Remember Why You Got Into Computing
- De Dan Collins en 07-01-16
De: Steven Levy