Kali Linux courses can help you learn penetration testing, network security, vulnerability assessment, and ethical hacking techniques. You can build skills in using command-line tools, scripting for automation, and analyzing security protocols. Many courses introduce tools like Metasploit, Wireshark, and Nmap, demonstrating how these skills are applied in real-world security assessments and threat analysis.

Skills you'll gain: File Systems, Linux, Linux Commands, File Management, Linux Administration, Operating Systems, Unix, Command-Line Interface
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Firewall, Zero Trust Network Access, Linux Administration, Network Security, Security Strategy, Remote Access Systems, Linux, Security Controls, Unix, Ubuntu, Systems Administration, System Configuration
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Hardening, Linux Administration, System Monitoring, Linux Commands, Performance Tuning, Linux, Systems Administration, File Management, Network Troubleshooting, Unix Commands, Debugging, Service Management, User Accounts, OS Process Management
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Linux, Linux Administration, File Systems, Ubuntu, Remote Access Systems, Operating System Administration, Linux Commands, File Management, Red Hat Enterprise Linux, System Configuration, Unix, Software Installation, Command-Line Interface, Operating Systems, Unix Commands, Systems Administration, Authorization (Computing), Virtualization, Virtual Machines, Open Source Technology
Beginner · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Network Security, Vulnerability Scanning, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Command-Line Interface, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Software Installation, File Management, Virtual Machines
Beginner · Course · 1 - 3 Months

Skills you'll gain: Linux Administration, Linux, System Configuration, Operating System Administration, Systems Administration, File Systems, Virtualization, File Management, Virtual Machines, Information Technology, Data Storage Technologies, Technical Communication
Advanced · Course · 1 - 3 Months

Packt
Skills you'll gain: Hardening, Remote Access Systems, Linux Servers, Linux Administration, Linux, Linux Commands, Authentications, Security Controls, Cryptographic Protocols, Key Management, Public Key Infrastructure, Software Installation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Exploitation techniques, Network Security, Intrusion Detection and Prevention, Local Area Networks, Threat Detection, General Networking, Linux, Linux Administration, Virtual Machines, Network Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Scripting, Vulnerability Assessments, Brute-force attacks, General Networking, Python Programming, Web Applications, Cybersecurity, Data Ethics, Firewall, Network Security, Wireless Networks, System Configuration
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Linux Commands, Linux, Command-Line Interface, Penetration Testing, General Networking, Cybersecurity, Data Ethics, Vulnerability Scanning, Network Security, System Configuration, Software Installation, Virtual Machines
Beginner · Course · 1 - 3 Months

Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP), General Networking, Security Awareness
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Exploitation techniques, Brute-force attacks, Virtual Machines, Software Documentation, Technical Documentation, Microsoft Windows, Windows PowerShell, Linux Commands, Scripting, Remote Access Systems
Intermediate · Course · 3 - 6 Months