Kali Linux is the penetration-testing professional’s main tool, and includes hundreds of modules for scanning, exploitation, payloads, and post exploitation. In this course, Malcolm Shore teaches you advanced pen testing with Kali, including stealthy testing, privilege escalation, and pivoting...
Understanding web applications from a user’s perspective is critical to establishing a foundation for vulnerability discovery. In this course, Web App Pen Testing: Mapping, you’ll learn how to analyze applications from a user’s perspective to gain a thorough understanding of why and how...