Different types of threat actors Conceptual overview of security testingCommon pitfalls of vulnerability assessments, penetration testing, and red team exercisesObjective-based penetration testingThe testing methodologyIntroduction to Kali Linux featuresThe role of Kali in red team tacticsInstalling and updating Kali LinuxUsing as a portable deviceInstalling Kali on a Raspberry Pi 4Installing Kali on a VMVMware Workstation PlayerVirtualBoxInstalling to a Docker applianceKali on AWS CloudKali on Google Cloud Platform (GCP)Kali on Android (non-rooted phones)Organizing Kali LinuxConfiguring and customizing Kali LinuxResetting the default passwordConfiguring network services and secure communicationsAdjusting network proxy settingsAccessing the secure shell remotelySpeeding up Kali operationsSharing folders with the host operating systemUsing Bash scripts to customize KaliBuilding a verification labInstalling defined targetsLab NetworkActive Directory and Domain ControllerInstalling Microsoft Exchange Server 2016 Metasploitable3MutillidaeCloudGoat Managing collaborative penetration testing using FaradaySummary