Ethical Hacking and Penetration, Step by Step with Kali Linux

· Primedia E-launch LLC
4.3
290 reviews
Ebook
122
Pages
Eligible

About this ebook

 This book is a complete guide for those who would like to become an Ethical hacker. In this book you will learn what the Ethical hacking and its procedure is. The first couple of chapters are the definitions, concepts and process of becoming an Ethical hacker while the next half of the book will show in detail how to use certain tools and techniques to initiate attacks and penetrate a system.

After reading this book, you should be able to use these tools to do some testing and even working on penetration projects. You just need to remember not to use these techniques in a production environment without having a formal approval.

Ratings and reviews

4.3
290 reviews
Jay Reign
December 9, 2023
It's okay - This book is great for beginners who aren't familiar with where to start in cyber security, but know they want to do pentesting content. That being said, in my opinion it's not worth the money. All of this content can easily be found on site like Medium, and doesn't offer any in-depth context on how to do things like finding Zero Day exploits. It's all surface content that most people will pick up just by doing Google searches. Rather than putting money into books like these, look at taking online classes threw Google, Microsoft, etc. to actually learn real cyber security, and pentesting content. You can also take classes threw OffSec themselves (the company that made Kali Linux).
Did you find this helpful?
Shaun Allaway
December 21, 2022
I bought this book last night ( 12/20/22 ) I got into the first chapter. Suddenly, it vanished from my library and now I have to repurchase it? it doesn't make any sense. I also have the receipt.
Did you find this helpful?
Jim Morris
December 31, 2015
Good value for money The book is a good value for money. It has some conceptual information at the beginning and introduces some good Kali tools later in the book. There is not lot information about commands options or detailed parameters but that's cool with me as I can always refer to the commands help and read. The important thing for me was to get an idea about tools and how they work and this book perfectly delivers that. It is probably not a book for high school students with no network or security background but if you have some basic knowledge, you can figure things out! In summary, it is a well worth read and recommended.
33 people found this review helpful
Did you find this helpful?

About the author

 Rassoul Ghaznavi-zadeh, the author, has been an IT security engineer since 1999. He started as a Cisco engineer and developed his networking and security knowledge around technologies like Cisco, Checkpoint, Juniper and also processes like ISO 27001, PCI.

He also has some extensive background around Linux systems and services and security tools available on them. Rassoul has helped a lot of enterprise organizations to have a safe and secure environment by testing, auditing and providing recommendations.

Rassoul has multiple international certificates around networking, security and architecting enterprise IT.

Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.