Explore Linux systems and automated security assessment tools in this comprehensive 34-minute video lecture. Delve into essential topics such as VMware vCenter, file systems, key files, password files, key parameters, and shadow files. Learn about performance reconnaissance and Remote Procedure Call (RPC) in the context of ethical hacking. Gain valuable insights from Bill Buchanan OBE as he covers crucial aspects of Unit 5 in the Certified Ethical Hacker (CEH) curriculum, providing a solid foundation for understanding Linux security and automated assessment techniques.
CeH Unit 5: Linux and Automated Security Assessment Tools