• Online, Self-Paced
Course Description
In this course we review some of the most powerful cybersecurity tools available for use in Kali Linux. In this, we will be discussing TOR, a freely available means of using the internet anonymously and accessing sites outside the "clear net". TOR is extremely versatile, and has been used by government officials, hackers, and criminals alike.

Learning Objectives

In this section, we will be discussing TOR, a freely available means of using the internet anonymously and accessing sites outside the "clear net". TOR is extremely versatile, and has been used by government officials, hackers, and criminals alike. As a disclaimer: We do not advocate any illegal activity, and any TOR browsing should be done in a safe and controlled environment. You can learn more on this topic and countless others by creating an account on Cybrary, simply click the link at the top of this page.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.