EDUCBA

Kali Linux: Ethical Hacking & Pentesting Specialization

EDUCBA

Kali Linux: Ethical Hacking & Pentesting Specialization

Master Ethical Hacking with Kali Linux.

Gain hands-on skills in penetration testing, cyber defense, and ethical hacking with Kali Linux

EDUCBA

Instructor: EDUCBA

Access provided by Toshiba Software India

1,740 already enrolled

Get in-depth knowledge of a subject

from 87 reviews of courses in this program

Beginner level

Recommended experience

4 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Get in-depth knowledge of a subject

from 87 reviews of courses in this program

Beginner level

Recommended experience

4 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Perform ethical hacking and penetration testing using Kali Linux tools and frameworks.

  • Identify, exploit, and defend against vulnerabilities across networks, systems, and applications.

  • Apply real-world cybersecurity methodologies to strengthen security postures.

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Advance your subject-matter expertise

  • Learn in-demand skills from university and industry experts
  • Master a subject or tool with hands-on projects
  • Develop a deep understanding of key concepts
  • Earn a career certificate from EDUCBA

Specialization - 6 course series

Ethical Hacking with Kali Linux: Learn & Secure

Ethical Hacking with Kali Linux: Learn & Secure

Course 1, 8 hours

What you'll learn

  • Define ethical hacking fundamentals and set up secure labs.

  • Perform reconnaissance using footprinting, DNS, and Google hacking.

  • Apply tools like Nmap & ZenMap to identify vulnerabilities.

Skills you'll gain

Category: Penetration Testing
Category: Vulnerability Scanning
Category: Operating Systems
Category: Virtual Machines
Category: Network Analysis
Category: Hardening
Category: Linux
Category: System Configuration
Category: Cybersecurity
Category: Software Installation
Category: Exploitation techniques
Category: Security Testing
Category: Linux Commands
Category: Linux Administration
Category: Vulnerability Assessments
Ethical Hacking with Kali Linux: Analyze & Defend

Ethical Hacking with Kali Linux: Analyze & Defend

Course 2, 7 hours

What you'll learn

  • Perform advanced reconnaissance using Nmap, DNS, and OSINT tools

  • Analyze phishing, social engineering, and malware techniques.

  • Simulate backdoor exploitation and persistence strategies.

Skills you'll gain

Category: Malware Protection
Category: Penetration Testing
Category: Network Analysis
Category: Human Factors (Security)
Category: Intrusion Detection and Prevention
Category: Exploitation techniques
Category: Cyber Security Assessment
Category: Network Security
Category: Cybersecurity
Category: Data Persistence
Category: Email Security
Category: Cyber Threat Intelligence
Category: Vulnerability Assessments
Ethical Hacking: Meterpreter, DNS & ICMP Attacks

Ethical Hacking: Meterpreter, DNS & ICMP Attacks

Course 3, 10 hours

What you'll learn

  • Identify and simulate backdoors, privilege escalation, and spoofing.

  • Apply tools like Meterpreter, John the Ripper, and EvilGrade.

  • Execute and defend against MITM, redirection, and DDoS attacks.

Skills you'll gain

Category: Network Security
Category: Penetration Testing
Category: Exploitation techniques
Category: Distributed Denial-Of-Service (DDoS) Attacks
Category: Cyber Operations
Category: Intrusion Detection and Prevention
Category: Network Analysis
Category: Network Routing
Category: Brute-force attacks
Category: Command-Line Interface
Category: Dynamic Host Configuration Protocol (DHCP)
Category: Data Persistence
Category: Metasploit
Category: Remote Access Systems
Category: Network Protocols
Ethical Hacking with Kali Linux: Analyze & Apply

Ethical Hacking with Kali Linux: Analyze & Apply

Course 4, 7 hours

What you'll learn

  • Analyze Android vulnerabilities and wireless encryption standards.

  • Apply wordlist generation, password cracking, and WPA2 analysis.

  • Deploy persistent payloads and test real-world attack vectors.

Skills you'll gain

Category: Exploitation techniques
Category: Data Persistence
Category: Wireless Networks
Category: Brute-force attacks
Category: Network Security
Category: Penetration Testing
Category: Vulnerability Assessments
Category: Linux
Category: Exploit development
Category: Microsoft Windows
Category: Security Testing
Category: Network Analysis
Category: Encryption
Category: Authentications
Ethical Hacking with Metasploit, SQL & Crypto

Ethical Hacking with Metasploit, SQL & Crypto

Course 5, 6 hours

What you'll learn

  • Apply Metasploit commands, exploits, and payloads in Kali Linux.

  • Perform SQL injection with manual, dork, and sqlmap techniques.

  • Analyze cryptographic methods, hash flaws, and DB security.

Skills you'll gain

Category: Penetration Testing
Category: Exploitation techniques
Category: SQL
Category: Cryptography
Category: Metasploit
Category: Database Management
Category: Vulnerability Assessments
Category: Encryption
Category: Exploit development
Category: Cybersecurity
Category: Command-Line Interface
Category: Brute-force attacks
Category: Data Import/Export
Category: Security Testing
Advanced Penetration Testing with Kali Linux

Advanced Penetration Testing with Kali Linux

Course 6, 7 hours

What you'll learn

  • Set up pentesting labs and perform advanced Nmap reconnaissance.

  • Build Python scanners, exploit SMTP, Samba, and NFS services.

  • Apply malware analysis, social engineering, and automation scripts.

Skills you'll gain

Category: Penetration Testing
Category: Exploitation techniques
Category: Scripting
Category: Automation
Category: Network Analysis
Category: Authentications
Category: Cyber Security Assessment
Category: Android (Operating System)
Category: Scripting Languages
Category: Security Testing
Category: Vulnerability Scanning
Category: Mobile Security
Category: Malware Protection
Category: Virtual Environment
Category: Human Factors (Security)
Category: Virtual Networking
Category: Test Script Development
Category: Vulnerability Assessments

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

EDUCBA
EDUCBA
1,155 Courses276,308 learners

Offered by

EDUCBA

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."