LINUX FOR HACKERS: LEARN CYBERSECURITY PRINCIPLES WITH SHELL,PYTHON,BASH PROGRAMMING USING KALI LINUX TOOLS. A COMPLETE GUIDE FOR BEGINNERS (HACKERS ESSENTIALS) by TYE DARWIN
English | December 4, 2020 | ISBN: N/A | ASIN: B08PJP5BZR | 292 pages | EPUB | 0.28 Mb
English | December 4, 2020 | ISBN: N/A | ASIN: B08PJP5BZR | 292 pages | EPUB | 0.28 Mb
Are You Looking Forward to be a cyber security specalist? ™
If you are enthusiastic to Master Linux and shell programming along with a lot of hacking tools then you are in the right place.
Hacking is a skill that needs huge patience and tremendous knowledge. This mega book set will help you to understand hacking philosophy that is essential for anyone looking forward to make a career in cyber security world.
What is this book?
This book is the second part of the series “ Hackers essentials” that is being written for helping out beginners who are enthusiastic to explore the world of hacking. This book consists of five modules and provides a lot of information about topics such as bash scripting, python scripting , shell programming , logging , process and file management systems along with a brief introduction to installation of your favourite linux distro in your system.
How to use this book?
To use this book, you need to have a Linux system of your own. That's it. Just read the technical information that is provided and experiment with all the tools , commands on your own system to gain knowledge about this vast subject.
So, what are you waiting for? Are you still not satisfied with the possibilities this book can cover? Just look down and read all the important topic this book covers for beginners.
What topics this book covered?
Module - 1
Linux philosophy
Linux distros
Comparison of popular Linux distros
Installation procedure
All the system and network settings
U-disk installation method
Partition scheming in detail And a lot more….
Module - 2
Linux basics for hackers
Software management in Linux
Process management in Linux
File management in Linux
Tor network
Proxies in detail
Virtual private network
Logging systems
Prioritising logs
And a lot moreeee…. ✓
Module - 3
Introduction to scripting
Python and its installation
Variables in Python
Data types in Python
Functions in Python
Loops in Python
Introducing bash
Bash interpreter
Variables in Bash
Functions in Bash
In-built Bash commands
And a lot more….
Module -4
Shell programming
Shell interpreter
Shell extensions
Shell basics
Example programs for shell
And a lot more…
Module -5
Introduction to virtual machines
Installation of Kali
Understanding Hacking process
Installing and using Burpsuite
Introducing Hacking tools
Networking tools
And a lot more..