The course is part of this learning path
This course explains how to set up Kali Linux as part of the Web Penetration Testing & Bug Bounty learning path.
Hi within this lecture, we're going to install Kali Linux as a virtual machine in our computers, and this will be the main operating system that we will be working on from now on so that we can learn about the tools that hackers use in order to web pen test or do bug bounty hunting. And if you have any kind of Kali Linux version that is running on your machine for some reason, of course, you're more than welcome to skip this section. But if you haven't worked with Kali Linux before or if you don't even know what the Linux is, then don't worry, we're going to see it from scratch. Just continue watching this section. Now if you're ready, let's get started.
Atil is an instructor at Bogazici University, where he graduated back in 2010. He is also co-founder of Academy Club, which provides training, and Pera Games, which operates in the mobile gaming industry.