Kali Linux courses can help you learn penetration testing, network security, vulnerability assessment, and ethical hacking techniques. You can build skills in using command-line tools, scripting for automation, and analyzing security protocols. Many courses introduce tools like Metasploit, Wireshark, and Nmap, demonstrating how these skills are applied in real-world security assessments and threat analysis.

Skills you'll gain: Metasploit, Exploit development, Exploitation techniques, Vulnerability, Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, System Configuration, Data Security, Cybersecurity, Cyber Attacks, Linux, Bash (Scripting Language), Proxy Servers, Scripting, Linux Commands, Scripting Languages, Python Programming
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Deployment, CI/CD, Open Web Application Security Project (OWASP), Continuous Integration, Istio, Agile Software Development, Scrum (Software Development), Application Deployment, Test Driven Development (TDD), Kubernetes, Gherkin (Scripting Language), Jenkins, Code Coverage, OpenShift, Cloud Applications, DevOps, Secure Coding, Grafana, System Monitoring, Agile Methodology
Build toward a degree
Intermediate · Professional Certificate · 3 - 6 Months

Skills you'll gain: Incident Response, Computer Security Incident Management, Mitigation, Cyber Threat Hunting, Digital Forensics, Cybersecurity, Security Information and Event Management (SIEM), Intrusion Detection and Prevention, Incident Management, Criminal Investigation and Forensics, Information Systems Security, Continuous Monitoring, Cyber Attacks, Computer Security, Network Security, Analysis, Network Analysis, Linux Commands, Bash (Scripting Language), Windows PowerShell
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Security Information and Event Management (SIEM), Penetration Testing, Vulnerability Assessments, Cybersecurity, Intelligence Collection and Analysis, Vulnerability Scanning, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Analysis, Network Analysis, Auditing, Data Analysis, Linux Commands, Data Collection, Correlation Analysis, Bash (Scripting Language), Windows PowerShell
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Django (Web Framework), Full-Stack Web Development, Version Control, Restful API, Data Structures, Unix Commands, Bootstrap (Front-End Framework), Git (Version Control System), API Testing, Back-End Web Development, GitHub, Relational Databases, Front-End Web Development, Object Oriented Programming (OOP), Database Management Systems, SQL, Database Design, Python Programming, Computer Programming, Cloud Hosting
Build toward a degree
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Command-Line Interface, Virtual Machines, Linux, Technical Documentation
Beginner · Guided Project · Less Than 2 Hours

The Linux Foundation
Skills you'll gain: Git (Version Control System), Version Control, Open Source Technology, Software Development Tools, Software Versioning, Development Environment, Linux
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Real-Time Operating Systems, Embedded Systems, Software Systems, Hardware Architecture, System Programming, Real Time Data, Operating Systems, Linux, OS Process Management, System Design and Implementation, System Requirements, Service Management, Service Design
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Operating System Administration, Digital Forensics, Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Computer Security Incident Management, Linux Commands, Database Management, Networking Hardware, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Build toward a degree
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Peripheral Devices, Computer Hardware, System Configuration, Virtualization and Virtual Machines, Computer Systems, Virtual Machines, Operating Systems, USB, Hardware Troubleshooting, Computing Platforms, Linux, Software Installation, Technical Support, Mac OS, Computer Architecture, File Systems, Network Infrastructure, Data Storage, User Accounts, Disaster Recovery
Beginner · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Management, Threat Modeling, Incident Response, Intrusion Detection and Prevention, Business Risk Management, Network Security, Vulnerability Assessments, Operating Systems, Threat Detection, Risk Management, Security Information and Event Management (SIEM), Bash (Scripting Language), Event Monitoring, Security Controls, Cybersecurity, Debugging, Computer Security Incident Management, File I/O, Linux, SQL
Beginner · Professional Certificate · 3 - 6 Months

Illinois Tech
Skills you'll gain: Open Source Technology, Linux, Package and Software Management, Shell Script, Linux Administration, Ubuntu, Linux Commands, Microsoft Windows, Unix Shell, Windows PowerShell, User Accounts, Bash (Scripting Language), Command-Line Interface, Systems Administration, Unix, Operating Systems, Scripting, Control Panels, Windows Servers, Security Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months