Security Analyst (Part 4 of 4): Configure Kali Linux
Interactive

Security Analyst (Part 4 of 4): Configure Kali Linux

Biz Library
Updated Feb 04, 2020

This course focuses on fully configuring Kali Linux to be the right tool for the job. It starts off with installing, which features to turn off and which tools to install. It covers using TOR, Linux commands, executing scripts and files as well as networking and penetration testing tools.