Learning Kali Linux. Security Assessment, Penetration Testing, Ethical Hacking. Second Edition
The Kali Linux distribution, which includes hundreds of built-in utilities, allows for rapid security testing. However, the sheer number of tools in the Kali Linux arsenal can be overwhelming. The second edition describes the updated capabilities of the utilities and...
provides a detailed look at digital forensics and reverse engineering. The author does not limit himself to security testing and also discusses forensic analysis, including disk and memory analysis, as well as basic malware analysis.
1. The second edition describes the updated capabilities of the utilities and provides a detailed look at digital forensics and reverse engineering. 2. Get acquainted with a wide range of tools available in Kali Linux. 3. Learn the basics of penetration testing throughout the entire attack lifecycle. 4. Familiarize yourself with Kali's advanced tools for applying sophisticated attack methods. 5. The author does not limit himself to security testing and also discusses forensic analysis, including disk and memory analysis, as well as basic malware analysis.
The Kali Linux distribution, which includes hundreds of built-in utilities, allows for rapid security testing. However, the sheer number of tools in the Kali Linux arsenal can be overwhelming. The second edition describes the updated capabilities of the utilities and provides a detailed look at digital forensics and reverse engineering. The author does not limit himself to security testing and also discusses forensic analysis, including disk and memory analysis, as well as basic malware analysis.
1. The second edition describes the updated capabilities of the utilities and provides a detailed look at digital forensics and reverse engineering.
2. Get acquainted with a wide range of tools available in Kali Linux.
3. Learn the basics of penetration testing throughout the entire attack lifecycle.
4. Familiarize yourself with Kali's advanced tools for applying sophisticated attack methods.
5. The author does not limit himself to security testing and also discusses forensic analysis, including disk and memory analysis, as well as basic malware analysis.
In stock
€ 33.69
Will be delivered to United States on 31 March (Tu):
By courier
from
€ 38.94
In stock
€ 33.69
Will be delivered to United States on 31 March (Tu):
Be the first to know about our current discounts, offers and new products!
Check icon
You have added to your basket
Check icon
You have added to favourites
Sold out
The item is currently out of stock.
In stock
Available in warehouse. You will receive the exact delivery date from the operator after the order confirmation.
To order
The product is delivered directly from the publisher. The order processing time is up to 14 days, you will receive the exact delivery date from the operator after the order confirmation.