paint-brush
Penetration testing: choosing the right (Linux) tool stack to fix your broken IT securityby@dclinton
2,421 reads
2,421 reads

Penetration testing: choosing the right (Linux) tool stack to fix your broken IT security

by David Clinton5mNovember 9th, 2017
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Got IT infrastructure? Do you know how secure it is? The answer will probably hurt, but this is the kind of bad news you’re better off getting sooner rather than later.

Company Mentioned

Mention Thumbnail
featured image - Penetration testing: choosing the right (Linux) tool stack to fix your broken IT security
David Clinton HackerNoon profile picture
David Clinton

David Clinton

@dclinton

AWS Solutions Architect and Linux server administrator. Books, courses, and other tech content.

About @dclinton
LEARN MORE ABOUT @DCLINTON'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

David Clinton HackerNoon profile picture
David Clinton@dclinton
AWS Solutions Architect and Linux server administrator. Books, courses, and other tech content.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite