Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues