skip to content
Information gathering with Kali Linux Preview this item
ClosePreview this item
Checking...

Information gathering with Kali Linux

Author: Sean-Philip Oriyano
Publisher: [Place of publication not identified] : Packt, [2017]
Edition/Format:   eVideo : Clipart/images/graphics : English
Summary:
"Kali Linux is a Linux distribution designed for digital forensics, penetration testing, and security auditing. It is the successor of BackTrack, the world's most popular penetration testing distributor. Kali Linux includes many well-known security tools, and this course will teach you more about the tools and their usage. This course not only shows you how to install Kali Linux, but also how to properly plan the  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Clipart/images/graphics, Internet resource, Videorecording
Document Type: Internet Resource, Computer File, Visual material
All Authors / Contributors: Sean-Philip Oriyano
OCLC Number: 1014025442
Notes: Title from title screen (viewed December 1, 2017).
Date of publication from resource description page.
Performer(s): Presenter, Sean-Philip Oriyano.
Description: 1 online resource (1 streaming video file (2 hr., 52 min.)) : digital, sound, color
Responsibility: Sean-Philip Oriyano.

Abstract:

"Kali Linux is a Linux distribution designed for digital forensics, penetration testing, and security auditing. It is the successor of BackTrack, the world's most popular penetration testing distributor. Kali Linux includes many well-known security tools, and this course will teach you more about the tools and their usage. This course not only shows you how to install Kali Linux, but also how to properly plan the installation and select the best hardware. We’ll include post-installation tasks and you’ll see how to configure Kali Linux to get the best performance, as well as ensuring your project needs are satisfied. Within this, we’ll show you how to gather information using the tools present in Kali Linux. The tools used in this course teach you how to acquire information about a target including web applications, documents, metadata, and other popular and powerful tools included with the distribution. This course helps you plan and install Kali Linux to get the optimal results for your specific needs. We’ll emphasize how to choose the best hardware and install the distribution and troubleshoot problems that may arise during the process. The course wraps up with post-installation and configuration tasks."--Resource description page.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1014025442> # Information gathering with Kali Linux
    a schema:VideoObject, schema:Movie, schema:CreativeWork ;
    library:oclcnum "1014025442" ;
    rdfs:comment "Unknown 'gen' value: cig" ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4660046479#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/4660046479#Topic/penetration_testing_computer_security> ; # Penetration testing (Computer security)
    schema:about <http://experiment.worldcat.org/entity/work/data/4660046479#CreativeWork/linux> ; # Linux.
    schema:about <http://experiment.worldcat.org/entity/work/data/4660046479#Topic/cyber_intelligence_computer_security> ; # Cyber intelligence (Computer security)
    schema:creator <http://experiment.worldcat.org/entity/work/data/4660046479#Person/oriyano_sean_philip> ; # Sean-Philip Oriyano
    schema:datePublished "2017" ;
    schema:description ""Kali Linux is a Linux distribution designed for digital forensics, penetration testing, and security auditing. It is the successor of BackTrack, the world's most popular penetration testing distributor. Kali Linux includes many well-known security tools, and this course will teach you more about the tools and their usage. This course not only shows you how to install Kali Linux, but also how to properly plan the installation and select the best hardware. We’ll include post-installation tasks and you’ll see how to configure Kali Linux to get the best performance, as well as ensuring your project needs are satisfied. Within this, we’ll show you how to gather information using the tools present in Kali Linux. The tools used in this course teach you how to acquire information about a target including web applications, documents, metadata, and other popular and powerful tools included with the distribution. This course helps you plan and install Kali Linux to get the optimal results for your specific needs. We’ll emphasize how to choose the best hardware and install the distribution and troubleshoot problems that may arise during the process. The course wraps up with post-installation and configuration tasks."--Resource description page."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/4660046479> ;
    schema:inLanguage "en" ;
    schema:name "Information gathering with Kali Linux"@en ;
    schema:productID "1014025442" ;
    schema:url <https://www.safaribooksonline.com/library/view/-/9781788625869/?ar> ;
    schema:url <http://ezproxy.torontopubliclibrary.ca/login?url=http://proquestcombo.safaribooksonline.com/?uiCode=torontopl&xmlId=9781788625869> ;
    schema:url <http://proquest.safaribooksonline.com/?fpi=9781788625869> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1014025442> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/4660046479#Person/oriyano_sean_philip> # Sean-Philip Oriyano
    a schema:Person ;
    schema:familyName "Oriyano" ;
    schema:givenName "Sean-Philip" ;
    schema:name "Sean-Philip Oriyano" ;
    .

<http://experiment.worldcat.org/entity/work/data/4660046479#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4660046479#Topic/cyber_intelligence_computer_security> # Cyber intelligence (Computer security)
    a schema:Intangible ;
    schema:name "Cyber intelligence (Computer security)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4660046479#Topic/penetration_testing_computer_security> # Penetration testing (Computer security)
    a schema:Intangible ;
    schema:name "Penetration testing (Computer security)"@en ;
    .

<https://www.safaribooksonline.com/library/view/-/9781788625869/?ar>
    rdfs:comment "from Safari" ;
    rdfs:comment "(Unlimited Concurrent Users)" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.