Chapter 5. Linux and Automated Assessment Tools

This chapter covers the following topics:

Image Linux: Certified ethical hackers should have a basic understanding of how Linux systems function.

Image Hacking Linux: Certified ethical hackers should also know the basic techniques used to target Linux computers.

Image Hardening Linux: Certified ethical hackers need to know the basic techniques used to harden Linux computers.

Automated Assessment Tools: For security ...

Get Certified Ethical Hacker (CEH) Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.