By completing this course, learners will be able to define the fundamentals of ethical hacking, configure secure lab environments, analyze operating system structures, perform reconnaissance techniques, and apply powerful tools such as Nmap and ZenMap for penetration testing. The course equips participants with practical skills to identify vulnerabilities, gather intelligence ethically, and evaluate system security in real-world scenarios.



Ethical Hacking with Kali Linux: Learn & Secure
This course is part of Kali Linux: Ethical Hacking & Pentesting Specialization

Instructor: EDUCBA
Access provided by Zain Group
What you'll learn
Define ethical hacking fundamentals and set up secure labs.
Perform reconnaissance using footprinting, DNS, and Google hacking.
Apply tools like Nmap & ZenMap to identify vulnerabilities.
Skills you'll gain
Details to know

Add to your LinkedIn profile
11 assignments
October 2025
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 3 modules in this course
This module introduces learners to the fundamentals of ethical hacking and penetration testing with a focus on Kali Linux. Students will explore the basics of operating systems, understand system structures, and set up a secure ethical hacking lab environment using virtual machines and VMware tools. By the end of this module, learners will be equipped with the foundational knowledge and lab configuration needed for advanced hacking practices.
What's included
9 videos4 assignments1 plugin
This module covers the reconnaissance phase of ethical hacking, focusing on footprinting, Google hacking, WHOIS lookups, and DNS footprinting. Learners will gain hands-on knowledge of gathering information through active and passive techniques, understanding how exposed data can reveal vulnerabilities, and leveraging search engines and online databases to strengthen penetration testing strategies.
What's included
9 videos4 assignments
This module advances the reconnaissance process by teaching learners how to determine operating systems, identify phishing attacks, and connect information databases for analysis. Learners will also master scanning networks using Nmap and ZenMap, interpreting results to discover vulnerabilities, and applying these techniques in real-world ethical hacking scenarios.
What's included
6 videos3 assignments
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Why people choose Coursera for their career









