This Edureka video on "Ethical Hacking using Kali Linux " will help you understand all about penetration testing, its methodologies, and tools.
Kali Linux is a purpose built security operating system with a large variety of popular penetration testing tools. Ethical Hacking: Introducing Kali Linux
This course is strictly based on white hat hacking practices and I do not promote any illegal activity. Take proper written permission from the owner of the website/network/computer or any other property before attempting any attack.
In this video I explain the importance of Docker and how it can be utilized for pentesting & bug bounty hunting. I also showcase how to set up Kali Linux, OWASP Juice Shop & Bug Bounty Toolkit on Docker.
Need to get a WiFi connection working with Kali Linux? This video shows you how. I explain which network cards will work with Kali Linux and why. I show you how to fix multiple issues with Kali Linux and Wi-Fi adapters to get monitoring and injection working. In this video I am using Kali Linux 2019.4 running as a virtual machine (VM) within VirtualBox. I also demonstrate the process to get Wireless working with Kali and VMware Workstation Pro.