By the end of this course, learners will be able to set up secure pentesting labs, perform advanced reconnaissance with Nmap, develop custom Python scanners, and exploit misconfigured services like SMTP, Samba, and NFS. They will also gain expertise in malware analysis, social engineering, Android exploitation, credential harvesting, and automation with resource scripts.



Advanced Penetration Testing with Kali Linux
This course is part of Kali Linux: Ethical Hacking & Pentesting Specialization

Instructor: EDUCBA
Access provided by SDNB College
What you'll learn
Set up pentesting labs and perform advanced Nmap reconnaissance.
Build Python scanners, exploit SMTP, Samba, and NFS services.
Apply malware analysis, social engineering, and automation scripts.
Skills you'll gain
Details to know

Add to your LinkedIn profile
7 assignments
October 2025
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 2 modules in this course
This module introduces learners to the fundamentals of advanced penetration testing by focusing on lab setup, reconnaissance techniques, and network scanning with Nmap. Learners will gain hands-on experience in configuring virtual environments, mastering advanced scanning strategies, and leveraging automation with scripts. Additionally, they will explore Python-based scanning and exploit commonly misconfigured services such as SMTP, Samba, and NFS. By completing this module, learners will establish a strong foundation in offensive security practices essential for advanced pentesting.
What's included
14 videos4 assignments1 plugin
This module explores advanced exploitation techniques, focusing on system testing strategies, malware analysis, and social engineering. Learners will study grey box and white box testing approaches, evaluate the role of malware in offensive security, and understand how human manipulation drives social engineering attacks. The module also covers mobile exploitation, privilege escalation, credential attacks through hashdumping and phishing, and the use of automated handlers to streamline attack workflows. By the end, learners will be equipped to perform sophisticated penetration testing against diverse attack vectors.
What's included
8 videos3 assignments
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Why people choose Coursera for their career









