The following instructor guide reviews core and key Linux commands for ethical hacking. These commands can be utilized for personal, educational, or corporate usage. It is envisioned that the instructor utilizes the material from this guide via a demonstration type format with each command reviewing the format, brief pros and cons and example. Command contents are grouped by high-level subject matter.
Introduction How to Use and Run Commands Create Example File Exploitation Forensics and Analysis Network Scanning and Enumeration Vulnerability Assessment Process Conclusion About the Author Notes
Librarian Note: There is more than one author by this name in the Goodreads database.
Disambiguated authors: (1) Kevin O'Neill - Comic Illustrator (Current Profile) (2) Kevin O'Neill - Irish journalist, Athlone, Football, Who Needs Cantona... (3) Kevin O'Neill - American, Liberal Arts, Experiential Learning Int'l (4) Kevin O'Neill - Rand, PRGS, Military Personnel (5) Kevin O'Neill - KMO, IT, SharePoint, Quizzes, Trivia, Management (6) Kevin O'Neill - Ph.D, U of Redlands, Death, Internet Afterlife (7) Kevin O'Neill - André Gide, Roman d'Aventure, Literary Analysis (8) Kevin O'Neill - Movie Franchises (9) Kevin O'Neill - ISIS, Nuclear Weapon Program Assessment (10) Kevin O'Neill - Boston College, Ireland, rural society, famine, Atlantic economy (11) Kevin O'Neill - Co-author and husband of Mary O'Neill, Religious (12) Kevin O'Neill - UXO, Engineering, Dartmouth, SPIE, IEEE, NSF (13) Kevin O'Neill - Narrator