By the end of this course, learners will be able to perform advanced reconnaissance using Nmap and DNS tools, evaluate social engineering and phishing techniques, differentiate between malware types, and simulate backdoor exploitation with persistence strategies. The course emphasizes hands-on application in Kali Linux, enabling students to develop practical penetration testing skills.



Ethical Hacking with Kali Linux: Analyze & Defend
This course is part of Kali Linux: Ethical Hacking & Pentesting Specialization

Instructor: EDUCBA
Access provided by Emerging Ladies Academy
What you'll learn
Perform advanced reconnaissance using Nmap, DNS, and OSINT tools
Analyze phishing, social engineering, and malware techniques.
Simulate backdoor exploitation and persistence strategies.
Skills you'll gain
Details to know

Add to your LinkedIn profile
9 assignments
October 2025
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 3 modules in this course
This module introduces students to essential reconnaissance techniques used in ethical hacking. Learners will explore Nmap scanning, WHOIS lookups, DNS enumeration, and OSINT tools such as The Harvester, Urlcrazy, dnsdict6, and Dnsrecon. By the end of the module, participants will be able to perform professional-grade information gathering and footprinting to map networks effectively.
What's included
9 videos3 assignments1 plugin
This module explores the human factor of cybersecurity, focusing on social engineering attacks such as phishing, spear-phishing, and mass mailer techniques. Learners will also study the behavior of computer malware, including viruses, worms, Trojans, and other malicious software. The module emphasizes recognizing, evaluating, and mitigating these threats in real-world penetration testing scenarios.
What's included
9 videos3 assignments
This module covers advanced exploitation techniques used to gain and maintain unauthorized access. Students will study historical viruses, rootkits, and backdoor mechanisms. They will also learn persistence strategies attackers use to retain control over compromised systems, alongside defensive practices for detection and prevention.
What's included
8 videos3 assignments
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Why people choose Coursera for their career









