Kali Linux courses can help you learn penetration testing, network security, vulnerability assessment, and ethical hacking techniques. You can build skills in using command-line tools, scripting for automation, and analyzing security protocols. Many courses introduce tools like Metasploit, Wireshark, and Nmap, demonstrating how these skills are applied in real-world security assessments and threat analysis.

Duke University
Skills you'll gain: Package and Software Management, Virtual Environment, Development Environment, Software Installation, Configuration Management, Python Programming, Command-Line Interface
Beginner · Guided Project · Less Than 2 Hours

Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Cloud Deployment, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, System Configuration, Firewall, Cloud Computing Architecture, Linux Administration, Risk Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Ansible, Red Hat Enterprise Linux, IT Automation, Devops Tools, Infrastructure as Code (IaC), YAML, Linux, Linux Administration, Linux Servers, Scenario Testing, Verification And Validation, Configuration Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Disaster Recovery, Server Administration, Windows Servers, Servers, Network Troubleshooting, Linux Servers, Virtualization, Hardware Troubleshooting, Operating System Administration, Virtual Machines, IT Automation, Remote Access Systems, Security Controls, Networking Hardware, System Support, Computer Hardware, Data Storage, Data Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Database Design, Continuous Integration, Restful API, Docker (Software), Model View Controller, Front-End Web Development, Databases, User Story, CI/CD, Java, Java Programming, Database Application, Application Programming Interface (API), HTML and CSS, Full-Stack Web Development, Spring Boot, Microservices, Back-End Web Development, Software Design Documents, Software Architecture
Advanced · Course · 1 - 3 Months

Skills you'll gain: TCP/IP, Network Protocols, Network Monitoring, OSI Models, Network Security, Web Servers, Network Analysis
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Docker (Software), CI/CD, Containerization, Development Environment, Continuous Deployment, Continuous Integration, Devops Tools, DevOps, Application Deployment, Linux, Software Development Tools, YAML, Data Persistence, Command-Line Interface
Beginner · Course · 1 - 3 Months

Skills you'll gain: Containerization, CI/CD, Kubernetes, Docker (Software), Google Cloud Platform, Cloud Development, Application Deployment, Cloud Deployment, DevSecOps, Infrastructure Security, Serverless Computing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Firewall, Ubuntu, Network Monitoring, TCP/IP, Data Storage, Network Protocols, Network Troubleshooting, Unix, General Networking, Linux, Command-Line Interface, Data Storage Technologies, System Configuration, Network Security, File Management, Shell Script, Computer Hardware, Disaster Recovery
Beginner · Course · 1 - 4 Weeks

Duke University
Skills you'll gain: Web Design and Development, Web Development, Cloud Deployment, Web Development Tools, Application Deployment, Cloud Hosting, Web Content, Rust (Programming Language), Content Management, Cloud Computing, Linux, Software Installation
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Linux Administration, Event Monitoring, File I/O, Performance Testing, Data Storage Technologies, Scenario Testing, Data Storage, Simulations
Intermediate · Specialization · 3 - 6 Months

Peking University
Skills you'll gain: Application Security, Authorization (Computing), Computer Security, Security Engineering, Operating Systems, Information Systems Security, Security Controls, Security Testing, Database Application, Security Requirements Analysis, Infrastructure Security, Virtualization, Virtual Machines, Data Integrity
Intermediate · Course · 3 - 6 Months