Conclusion
May I take this opportunity to thank you for being able to make it to the end of this informative book, Kali Linux. I want to believe that it has been edifying, and through it, you are now able to hit the ground running in matters revolving around hacking. Also, I hope that you have gained the relevant expertise to enable you to begin your hacking career or better your skills if you are already one. I sincerely hope that you have enjoyed turning pages right from the first topic which was Introduction to Kali Linux, all through The Basics of Kali Linux, The Hacking Process, Wireless Network Hacking, Uses and Applications of Kali Linux, Introduction to Cybersecurity, Network Scanning and Management and Web Security. I trust that by studying this book, you have gotten to learn plenty of practical concepts that you need to become a hacking expert.  By now, you must have been able to get access to a vast body of theoretical knowledge regarding the various types of attacks that can be launched on your systems, the reason for launching them and how you are able to safeguard your infrastructure against such attacks. These are your first steps towards becoming a professional hacker. The book covers topical issues like wireless network attacks, cyber-attacks and penetration testing, among others. It, therefore, means that you are now in a good position to discern network attack mechanisms that occur in the real world and prescribe appropriate remedies.  I have also given you a few security measures you can implement to keep your networks safe. The formatting is such that the language is a user-friendly language that you can understand the importance of securing your networks. Going forward, the next step is to put the concepts you have acquired from this book into practice. They say practice makes perfect and it is by practicing that one can become an expert in the field of hacking, more so using Kali Linux. Let the knowledge you have acquired from the book work for you.