- [Voiceover] Everyday, we hear of another data breach. Big or small, public or private. In the digital world, business is connected. And that means it's exposed. I'm Malcolm Shore, and I've spent a career helping government and businesses protect their systems. Minimizing the risk of being today's data breach means testing systems thoroughly, before they go online. And that's the role of the penetration tester. The tool most commonly used to do this testing is Kali Linux.

In this course I'll explore how we can use Kali Linux to test systems for weaknesses. We'll look at how to establish a virtual network of systems to use as a learning environment for Kali. And we'll look at the Kali system and I'll demonstrate some of the tools provided by Kali for testing system. I'll start by taking a look at Oracle's VirtualBox environment. And I'll build a network of testing target. I'll then describe to Kali operating system in this extensive set of tools for information gathering and system testing.

When you finish this course, you'll have a great understanding of how to set up a virtual test network, and use it to test systems for vulnerabilities.