/Computer-Security-KaliLinux

Introduction to Computer Security with Kali Linux

Computer Security and Hacking with KaliLinux

Hacking cycle: Enumeration phase, Vulnerability Identification, Vulnerability Exploitation, Limited code Execution, Privilege escalation.
Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments
Kali Linux tools and software used: Nmap, Dirb, BurpSuite, Sqlmap, ftp, ssh, John the ripper.