Kali Linux Purple - Learn to Use Kali for Defense Udemy
Price: USD 20
  • Duration: Flexible

Course details

Over the years, penetration testers and red team members have come to count on the Kali Linux platform. 

Now, it's time to build up defensive security with Kali Purple.


Kali Purple promises to be an innovative platform - one that is designed to support the defensive side of cyber security.

Join us as we take a first look at Kali Purple and explore the this impressive defensive platform.


Kali Purple is intended to boost your security posture by providing comprehensive coverage across the five domains of the NIST Cybersecurity Framework.  Through the platform's  powerful and specialized toolset, Kali Purple is poised to enhance how you approach defending your network, systems, and critical assets.


This course will introduce you to the unique features and capabilities of Kali Purple. Explore the differences between it and the traditional Kali Linux and see how Kali Purple specifically meets the needs of today's defensive cybersecurity professional.


The course is structured to:

  • Provide an Overview of Kali Linux Purple

  • Walk You Through the Installation Process

  • Show You How to Add Tools to Kali Purple

  • Describe the Support for Scripting

  • Give You a Tour of Key Blue Team Tools

  • Give You a Tour of Supplemental Red Team Tools


One of the main things you'll learn is how to obtain and install the distribution.  We'll provide guidance on how to setup a virtual machine to host the platform, then install and configure Kali Linux Purple.  All done with easy to follow, step-by-step instructions.

We'll also take a look at some of the new tools incorporated into Kali Purple, and discuss how to install additional blue team and red team tools.


Enroll Today and Start Using Kali to Defend Your Network!


Updated on 02 May, 2023
Courses you can instantly connect with... Do an online course on Cybersecurity starting now. See all courses

Is this the right course for you?

Didn't find what you were looking for ?

or