Webinar: Kali Linux Overview

by CompTIA | Feb 20, 2019

Office Hours with JamesLike it or not, Kali Linux (a version of Linux that already has many security tools incorporated within it) has become the poster child for penetration testing. It’s used throughout the industry by cybersecurity professionals and “script kiddies” alike.

In his next Office Hours session, CompTIA Chief Technology Evangelist Dr. James Stanger will take a more in-depth look at the tools Kali has to offer. More importantly, James will investigate the techniques and procedures that tend to set the cybersecurity professionals apart from the rest. He will also spend time contextualizing these tools in the larger activities of the penetration tester, as well as the in the duties of other job roles, such as security analyst.

For example, James will explain how to configure tools such as Shodan, Nmap, Maltego and Metasploit to work together for passive and active scanning. James will also profile tools such as BeEf, Netcat and John the Ripper.

Join James to learn more Kali tools and how they map to the hacker lifecycle.

Click Here to Watch the On-Demand Webinar

Webinar Details

What: Kali Linux Overview: Tips, Tricks and Traps for Cybersecurity Professionals

When: Anytime! Click to watch the webinar on-demand

How Long: 1 Hour

Click Here to Watch the On-Demand Webinar


  • Nimesh Vyas

    Friday, February 22, 2019


  • Kal Biradavolu

    Friday, February 22, 2019

    Would like to register for this class. If I cannot attend for any reason, can I able to listen to the lecture after words and get the credit for completion of the course ? Please clarify.

  • Monday, February 25, 2019

    Hi, Kal! As it says above, if you register for the webinar but are unable to attend, we will send you a link for the on-demand version that you can watch at any time. This webinar is simply informative - you will not earn CEUs.

  • Mark

    Tuesday, February 26, 2019

    I am a survivor

  • Daniel Guyani

    Wednesday, February 27, 2019

    Be an expert in IT Security

Leave a Comment

Boost your Career with a Certification

Find out more about our Certifications

How to get Certified

4 Steps to Certification

Already certified? Let us and others know!

Share Your Story