From the course: Complete Guide to Open Source Security

Unlock the full course today

Join today to access over 24,500 courses taught by industry experts.

Next steps

Next steps

- [Malcolm] I'd really like to thank you for joining me for this course. I hope you enjoyed discovering just a few examples of the wealth of open source security software that we can use. We've only touched on the surface of the tools we've looked at, but you've now got the knowledge and skills needed to install and start building your expertise in those areas relevant to you. Do check on this course from time to time as we'll be regularly adding more breadth and depth to it. There's always something new in cybersecurity, and if you're interested in learning more, then check out the full security segment of the library where new security courses are added regularly. You'll find courses on using Carly Linux, information gathering, viruses, worms, social engineering, denial of service, and much more. I'd also like to invite you to go to my LinkedIn Learning author page where you can find many more courses, which will give you a deeper insight and knowledge in many of the areas of open…

Contents