
Hacker's Guide to Linux: Unlocking the Power of Networking, Scripting, and Security in Kali Linux
Reuben Lloyd
Premium
Chapter 1: The Basics of Kali Linux 4
1/15/2025
Introduction to Kali Linux 4
1/15/2025
Installing Kali Linux 8
1/15/2025
Configuring Kali Linux 13
1/15/2025
Chapter 2: Networking with Kali Linux 18
1/15/2025
Network reconnaissance 18
1/15/2025
Packet sniffing 22
1/15/2025
Port scanning 27
1/15/2025
Chapter 3: Scripting with Kali Linux 32
1/15/2025
Introduction to scripting 32
1/15/2025
Bash scripting basics 38
1/15/2025
Python scripting basics 42
1/15/2025
Chapter 4: Security with Kali Linux 48
1/15/2025
Introduction to cybersecurity 48
1/15/2025
Penetration testing 52
1/15/2025
Vulnerability assessment 56
1/15/2025
Chapter 5: Ethical Hacking with Kali Linux 62
1/15/2025
Principles of ethical hacking 62
1/15/2025
Legal and ethical considerations 66
1/15/2025
Ethical hacking tools 71
1/15/2025
Chapter 6: Wireless Attacks with Kali Linux 76
1/15/2025
Introduction to wireless networks 76
1/15/2025
Wireless reconnaissance 80
1/15/2025
Wireless hacking techniques 85
1/15/2025
Chapter 7: Advanced Network Exploitation 90
1/15/2025
Advanced port scanning techniques 90
1/15/2025
Buffer overflow attacks 95
1/15/2025
SQL injection attacks 100
1/15/2025
Chapter 8: Vulnerability Assessment with Kali Linux 105
1/15/2025
Vulnerability assessment basics 105
1/15/2025
Vulnerability management 109
1/15/2025
Vulnerability assessment tools 112
1/15/2025
Chapter 9: Penetration Testing with Kali Linux 118
1/15/2025
Penetration testing fundamentals 118
1/15/2025
Penetration testing phases 123
1/15/2025
Penetration testing tools 127
1/15/2025
Chapter 10: Malware Analysis with Kali Linux 133
1/15/2025
Introduction to malware 133
1/15/2025
Malware analysis tools 138
1/15/2025
Malware analysis techniques 143
1/15/2025
Chapter 11: Cryptography with Kali Linux 148
1/15/2025
Introduction to cryptography 148
1/15/2025
Encryption algorithms 152
1/15/2025
Decryption techniques 157
1/15/2025
Chapter 12: Cloud Security with Kali Linux 162
1/15/2025
Introduction to cloud computing 162
1/15/2025
Cloud security challenges 167
1/15/2025
Cloud security assessment 172
1/15/2025
Chapter 13: Mobile Security with Kali Linux 176
1/15/2025
Introduction to mobile security 176
1/15/2025
Mobile threat analysis 180
1/15/2025
Mobile security assessment 185
1/15/2025
Chapter 14: IoT Security with Kali Linux 190
1/15/2025
Introduction to IoT security 190
1/15/2025
IoT threat modeling 195
1/15/2025
IoT security assessment 199
1/15/2025
Chapter 15: Incident Response with Kali Linux 205
1/15/2025
Incident response fundamentals 205
1/15/2025
Incident response process 209
1/15/2025
Incident response tools 214
1/15/2025
Chapter 16: Career in Cybersecurity 219
1/15/2025
Introduction to cybersecurity careers 219
1/15/2025
Cybersecurity job roles 225
1/15/2025
Cybersecurity certifications 230
1/15/2025