By the end of this course, learners will be able to perform advanced reconnaissance using Nmap and DNS tools, evaluate social engineering and phishing techniques, differentiate between malware types, and simulate backdoor exploitation with persistence strategies. The course emphasizes hands-on application in Kali Linux, enabling students to develop practical penetration testing skills.

Ethical Hacking with Kali Linux: Analyze & Defend

Ethical Hacking with Kali Linux: Analyze & Defend
This course is part of Kali Linux: Ethical Hacking & Pentesting Specialization

Instructor: EDUCBA
Access provided by Inter IKEA
15 reviews
What you'll learn
Perform advanced reconnaissance using Nmap, DNS, and OSINT tools
Analyze phishing, social engineering, and malware techniques.
Simulate backdoor exploitation and persistence strategies.
Skills you'll gain
Tools you'll learn
Details to know

Add to your LinkedIn profile
9 assignments
October 2025
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Learner reviews
- 5 stars
100%
- 4 stars
0%
- 3 stars
0%
- 2 stars
0%
- 1 star
0%
Showing 3 of 15
Reviewed on Jan 4, 2026
The instructors were phenomenal ensuring that the students were following and that the pace was appropriate.
Reviewed on Jan 4, 2026
I appreciated how the instructor surveyed the class before to get a sense of what we all wanted to take away from the course.
Reviewed on Dec 9, 2025
Awesome instructor – super helpful, great attitude, energetic.





