EDUCBA
Ethical Hacking with Kali Linux: Analyze & Defend
EDUCBA

Ethical Hacking with Kali Linux: Analyze & Defend

EDUCBA

Instructor: EDUCBA

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
6 hours to complete
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
6 hours to complete
Flexible schedule
Learn at your own pace

What you'll learn

  • Perform advanced reconnaissance using Nmap, DNS, and OSINT tools

  • Analyze phishing, social engineering, and malware techniques.

  • Simulate backdoor exploitation and persistence strategies.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

October 2025

Assessments

9 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Build your subject-matter expertise

This course is part of the Kali Linux: Ethical Hacking & Pentesting Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate

There are 3 modules in this course

This module introduces students to essential reconnaissance techniques used in ethical hacking. Learners will explore Nmap scanning, WHOIS lookups, DNS enumeration, and OSINT tools such as The Harvester, Urlcrazy, dnsdict6, and Dnsrecon. By the end of the module, participants will be able to perform professional-grade information gathering and footprinting to map networks effectively.

What's included

9 videos3 assignments1 plugin

This module explores the human factor of cybersecurity, focusing on social engineering attacks such as phishing, spear-phishing, and mass mailer techniques. Learners will also study the behavior of computer malware, including viruses, worms, Trojans, and other malicious software. The module emphasizes recognizing, evaluating, and mitigating these threats in real-world penetration testing scenarios.

What's included

9 videos3 assignments

This module covers advanced exploitation techniques used to gain and maintain unauthorized access. Students will study historical viruses, rootkits, and backdoor mechanisms. They will also learn persistence strategies attackers use to retain control over compromised systems, alongside defensive practices for detection and prevention.

What's included

8 videos3 assignments

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

EDUCBA
EDUCBA
403 Courses121,158 learners

Offered by

EDUCBA

Explore more from Security

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions