RedVector RVLS-1672

Hacker: Configuring Linux for Pentesting

Hacker: Configuring Linux for Pentesting

0.5 hr. Online Course

Level: Intermediate

Item#: RVLS-1672

SME: Anonymous

This course has been discontinued
 
Linux has been the number one OS used for hacking and penetration testing. In our course, Configuring Linux for Pentesting, the student will be learning the various phases of penetration testing on Linux and the tools that are used for each phase. This course will be paired with demos on apt-get, Essential Tools and GUI, Iptables, and IP forwarding.