The description of Security Assessments
The documentation provides efficient approach, commands and examples for performing security assessment by using Kali Linux distribution and additional resources.
Application contains the following modules:
Kali Linux Tips
Linux Security Audit Commands
Analyzing Network Captures
Crafting Network Protocols
Security for Organisations
Defense / IT Security Controls
Author selected the methods based on own experiences in Security Industry with focus on providing fast and effective way of finding the vulnerabilities in IT systems and corporate networks.