Best Sellers Rank: #45,818 in Books (See Top 100 in Books) #5 in Linux Networking & System Administration #13 in Computer Network Security #17 in Computer Hacking
Customer Reviews: 4.7 out of 5 stars 84Reviews
Product Information
From the Publisher
How has your experience helped you write this book?
My professional background focuses on information security and cybersecurity operations, whereby I develop and implement security policies and procedures and am responsible for conducting both red and blue teaming exercises to identify and reduce cyberattacks and threats and mitigate cyber risks.
My cybersecurity background played an important role during the writing of this book, as it enabled me to create practical exercises to demonstrate how real-world techniques and procedures are used by industry professionals, with the intent to help readers efficiently develop the hands-on skills needed to break into the cybersecurity industry as aspiring ethical hackers and penetration testers.
Furthermore, my academic background spans a decade as a cybersecurity educator, which helps me break down complex topics into easy-to-understand content to ensure all readers can follow along while maintaining a beginner-friendly and student-centric approach.
What part or parts of the book are your favourites and why?
My favorite parts from The Ultimate Kali Linux Book are, particularly, the chapters on Command and Control (C2) operations and Advanced Wireless Penetration Testing. I’ve always found it exciting to set up and work with C2 operations during penetration testing. Additionally, since I started my journey in the cybersecurity industry, wireless penetration testing has been one of the most exciting topics because there are so many wireless devices emitting sensitive information that can be easily collected and analyzed for security vulnerabilities.
What’s new in this edition of The Ultimate Kali Linux book?
Well, a lot of things are new in this edition, like setting and deploying Kali Linux 2024.1 for penetration testing. I have added deeper insights into tactics and techniques for ethical hacking and penetration testing. There are also new labs on web application security and social engineering. Also, the procedures for building virtual lab environments have been improved and made easier to understand and follow as a beginner. Along with all that, there is a new and dedicated chapter for setting up the virtual lab on Ubuntu that has been created specifically for users who use Ubuntu Desktop as their host operating system.
This edition includes a chapter dedicated to Open-Source Intelligence (OSINT), focusing on collecting and analyzing publicly available information about targeted systems, networks, and organizations.