
Kali Linux: The Definitive Guide to Ethical Hacking and Penetration Testing
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Buy for $5.99
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Virtual Voice

This title uses virtual voice narration
About this listen
Understanding the basics of ethical hacking and penetration testing
Overview of the various tools included in Kali Linux, such as Nmap, Wireshark, and Metasploit
Hands-on tutorials and exercises to demonstrate the practical application of these tools.
Advanced topics such as wireless hacking, web application hacking, and exploitation techniques
Best practices and tips for ethical hacking and penetration testing
People who viewed this also viewed...
-
Learn Linux Quickly
- A Comprehensive Guide for Getting Up to Speed on the Linux Command Line (Ubuntu) (Crash Course with Hands-On Project)
- By: Code Quickly, Paul H. Bartley
- Narrated by: Helpful Matthew
- Length: 8 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Learn Linux Quickly takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell (or command line). Along the way, you'll learn the timeless skills handed down by generations of experienced, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching, and more. In addition to that practical knowledge, we reveal the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix mainframes of yore.
-
-
I am impressed by the way..
- By Christina V. Whiteman on 05-06-22
By: Code Quickly, and others
-
Hacking for Dummies, 7th Edition
- By: Kevin Beaver CISSP
- Narrated by: Tom Perkins
- Length: 11 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- By Amazon Customer on 12-25-22
-
Mastering Ethical Hacking
- Unleash Your Defensive Skills in the World of Ethical Hacking
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 5 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Introducing your go-to guide in the world of cybersecurity, "Mastering Ethical Hacking." This comprehensive, exciting, and instructive eBook takes you on a journey into the intriguing universe of ethical hacking. It aims to empower you with the knowledge and techniques to protect and secure virtual environments from the darker corners of the cyber world. There's an increasing need for ethical hackers in today's digital age, and this high-value guide introduces you to the fascinating world of ethical hacking and cybersecurity. Starting with a detailed understanding of the importance and role...
By: Barrett Williams, and others
-
CompTIA Linux+ (Plus) Certification: The Ultimate Study Guide to Ace the Exam
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the dynamic landscape of technology, familiarity with Linux has become increasingly indispensable. Our book offers a comprehensive exploration of the Linux operating system, tailored for both beginners and seasoned users seeking to deepen their understanding and refine their skills. With a blend of theoretical knowledge and practical applications, this book serves as a valuable resource for anyone looking to navigate the complexities of Linux effectively.
-
-
Technical Pronunications
- By Michael on 01-25-25
By: Jake T Mills
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- By: Roger A. Grimes
- Narrated by: Jonathan Todd Ross
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
-
-
Please stop reading the urls
- By Jonathan on 11-16-19
By: Roger A. Grimes
-
Learn Linux Quickly
- A Comprehensive Guide for Getting Up to Speed on the Linux Command Line (Ubuntu) (Crash Course with Hands-On Project)
- By: Code Quickly, Paul H. Bartley
- Narrated by: Helpful Matthew
- Length: 8 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Learn Linux Quickly takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell (or command line). Along the way, you'll learn the timeless skills handed down by generations of experienced, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching, and more. In addition to that practical knowledge, we reveal the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix mainframes of yore.
-
-
I am impressed by the way..
- By Christina V. Whiteman on 05-06-22
By: Code Quickly, and others
-
Hacking for Dummies, 7th Edition
- By: Kevin Beaver CISSP
- Narrated by: Tom Perkins
- Length: 11 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- By Amazon Customer on 12-25-22
-
Mastering Ethical Hacking
- Unleash Your Defensive Skills in the World of Ethical Hacking
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 5 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Introducing your go-to guide in the world of cybersecurity, "Mastering Ethical Hacking." This comprehensive, exciting, and instructive eBook takes you on a journey into the intriguing universe of ethical hacking. It aims to empower you with the knowledge and techniques to protect and secure virtual environments from the darker corners of the cyber world. There's an increasing need for ethical hackers in today's digital age, and this high-value guide introduces you to the fascinating world of ethical hacking and cybersecurity. Starting with a detailed understanding of the importance and role...
By: Barrett Williams, and others
-
CompTIA Linux+ (Plus) Certification: The Ultimate Study Guide to Ace the Exam
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the dynamic landscape of technology, familiarity with Linux has become increasingly indispensable. Our book offers a comprehensive exploration of the Linux operating system, tailored for both beginners and seasoned users seeking to deepen their understanding and refine their skills. With a blend of theoretical knowledge and practical applications, this book serves as a valuable resource for anyone looking to navigate the complexities of Linux effectively.
-
-
Technical Pronunications
- By Michael on 01-25-25
By: Jake T Mills
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- By: Roger A. Grimes
- Narrated by: Jonathan Todd Ross
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
-
-
Please stop reading the urls
- By Jonathan on 11-16-19
By: Roger A. Grimes