18
Best Practices for the Real World
Your journey as an aspiring ethical hacker and penetration tester is only just beginning. You have gained some amazing hands-on skills throughout the previous chapters of this book and have learned various techniques while developing the mindset of a penetration tester. Furthermore, you have learned how to use the most popular penetration testing Linux distribution, Kali Linux, to simulate various real-world cyber-attacks to discover and exploit various security vulnerabilities on systems and networks.
While you have learned a lot, there are a few guidelines and tips I would like to share with you before concluding this book. During the course of this chapter, you will learn about various guidelines that ...
Get The Ultimate Kali Linux Book - Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.