placing your order...Don't refresh or navigate away from the page.
Learn ethical hacking through Kali Linux, one of the leading computer security operating systems, so you can find and fix your system’s vulnerabilities. This course shows you how to gather information, detect vulnerabilities, and exploit them using Kali Linux. In just over three hours, you will have all the tools you need to test your own servers and applications for vulnerabilities.
Computer security is one of the fastest-growing fields in technology, and ethical hacking is an important skill for security professionals. With a new attack every 39 seconds, it is essential for security experts to have skills with the most powerful tools for the job. The tools in Kali Linux are commonly used by attackers. These same tools are also used by defenders to help secure their systems. Learning Kali Linux will allow you to secure your system before the attackers get to it.
Learn how to exploit common vulnerabilities in Linux and Windows, as well as how to find common vulnerabilities in web apps such as command injections and SQL injections.
Distributed by Manning Publications
This course was created independently by Scott Cosentino and is distributed by Manning through our exclusive liveVideo platform.
Scott Cosentino is a developer and teacher who works primarily in software development and computer security. He is passionate about teaching and has inspired students in large classes, one-on-one, and online video courses. He believes mathematics and computer science can be approachable and fun, and tailors his courses to be easy to comprehend, with exploration of the what, why, and how of every topic. Because computer science and programming topics are not spectator sports, he provides many examples and practice problems for students to learn and practice.
geekle is based on a wordle clone.