filmov
tv
20 Things You MUST DO After Installing Kali Linux
Показать описание
In this video, I will show you 20 things you should do after installing Kali Linux.
Kali Linux is mainly used for advanced Penetration Testing and Security Auditing. Kali contains several hundred tools that are geared towards various information security tasks, such as Penetration Testing, and Security research.
Whether you're a seasoned Penetration Tester or just starting your journey in cybersecurity, these 20 must-do tasks will help you optimize your Kali Linux experience.
Enjoy the video!
⏰Timestamps⏰
00:00 Intro
00:24 Update and Upgrade
01:08 Install Additional Tools
01:29 Set Up Non-Root User
02:13 Add User to Sudoers
02:48 Change Default Passwords
03:08 Configure Network Settings
03:44 Enable SSH
04:23 Configure Firewall
05:00 Install VirtualBox Guest Additions
05:56 Configure Timezone
06:29 Install Graphics Drivers
06:45 Secure GRUB Bootloader
07:26 Remove Unnecessary Services
08:06 Encrypt Hard Drive
08:57 Configure Automatic Updates
09:48 Enable AppArmor or SELinux
10:46 Install Tor
11:25 Customize Bash Shell
11:57 Disable Root SSH Login
12:22 Review Documentation and Tutorials
12:40 Outro
****Career Resources****
Be sure to leave any questions or comments below!
Kali Linux is mainly used for advanced Penetration Testing and Security Auditing. Kali contains several hundred tools that are geared towards various information security tasks, such as Penetration Testing, and Security research.
Whether you're a seasoned Penetration Tester or just starting your journey in cybersecurity, these 20 must-do tasks will help you optimize your Kali Linux experience.
Enjoy the video!
⏰Timestamps⏰
00:00 Intro
00:24 Update and Upgrade
01:08 Install Additional Tools
01:29 Set Up Non-Root User
02:13 Add User to Sudoers
02:48 Change Default Passwords
03:08 Configure Network Settings
03:44 Enable SSH
04:23 Configure Firewall
05:00 Install VirtualBox Guest Additions
05:56 Configure Timezone
06:29 Install Graphics Drivers
06:45 Secure GRUB Bootloader
07:26 Remove Unnecessary Services
08:06 Encrypt Hard Drive
08:57 Configure Automatic Updates
09:48 Enable AppArmor or SELinux
10:46 Install Tor
11:25 Customize Bash Shell
11:57 Disable Root SSH Login
12:22 Review Documentation and Tutorials
12:40 Outro
****Career Resources****
Be sure to leave any questions or comments below!
Комментарии