EDUCBA
Kali Linux: Ethical Hacking & Pentesting Specialization
EDUCBA

Kali Linux: Ethical Hacking & Pentesting Specialization

Master Ethical Hacking with Kali Linux. Gain hands-on skills in penetration testing, cyber defense, and ethical hacking with Kali Linux

EDUCBA

Instructor: EDUCBA

Included with Coursera Plus

Get in-depth knowledge of a subject
Beginner level

Recommended experience

1 month at 10 hours a week
Flexible schedule
Earn a career credential
Share your expertise with employers
Get in-depth knowledge of a subject
Beginner level

Recommended experience

1 month at 10 hours a week
Flexible schedule
Earn a career credential
Share your expertise with employers

What you'll learn

  • Perform ethical hacking and penetration testing using Kali Linux tools and frameworks.

  • Identify, exploit, and defend against vulnerabilities across networks, systems, and applications.

  • Apply real-world cybersecurity methodologies to strengthen security postures.

Overview

What’s included

Shareable certificate

Add to your LinkedIn profile

Taught in English
Recently updated!

October 2025

55 practice exercises

Advance your subject-matter expertise

  • Learn in-demand skills from university and industry experts
  • Master a subject or tool with hands-on projects
  • Develop a deep understanding of key concepts
  • Earn a career certificate from EDUCBA

Specialization - 6 course series

What you'll learn

  • Define ethical hacking fundamentals and set up secure labs.

  • Perform reconnaissance using footprinting, DNS, and Google hacking.

  • Apply tools like Nmap & ZenMap to identify vulnerabilities.

Skills you'll gain

Penetration Testing, Operating Systems, Network Analysis, Vulnerability Scanning, Virtual Machines, Cybersecurity, Vulnerability Assessments, Exploit development, Hardening, Linux, and System Configuration

What you'll learn

  • Perform advanced reconnaissance using Nmap, DNS, and OSINT tools

  • Analyze phishing, social engineering, and malware techniques.

  • Simulate backdoor exploitation and persistence strategies.

Skills you'll gain

Penetration Testing, Malware Protection, Human Factors (Security), Network Analysis, Exploitation techniques, Cyber Threat Intelligence, Threat Detection, Cybersecurity, Vulnerability Assessments, and Email Security

What you'll learn

  • Identify and simulate backdoors, privilege escalation, and spoofing.

  • Apply tools like Meterpreter, John the Ripper, and EvilGrade.

  • Execute and defend against MITM, redirection, and DDoS attacks.

Skills you'll gain

Network Protocols, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Exploitation techniques, Penetration Testing, Microsoft Windows, Remote Access Systems, Cyber Security Assessment, Command-Line Interface, Metasploit, and Network Analysis

What you'll learn

  • Analyze Android vulnerabilities and wireless encryption standards.

  • Apply wordlist generation, password cracking, and WPA2 analysis.

  • Deploy persistent payloads and test real-world attack vectors.

Skills you'll gain

Exploitation techniques, Penetration Testing, Wireless Networks, Linux Commands, Security Testing, Operating Systems, Cryptography, Microsoft Windows, Vulnerability Assessments, and Network Security

What you'll learn

  • Apply Metasploit commands, exploits, and payloads in Kali Linux.

  • Perform SQL injection with manual, dork, and sqlmap techniques.

  • Analyze cryptographic methods, hash flaws, and DB security.

Skills you'll gain

Metasploit, Exploitation techniques, Penetration Testing, SQL, Cryptography, Cybersecurity, Encryption, Vulnerability Scanning, Public Key Infrastructure, Data Encryption Standard, Data Import/Export, Vulnerability Assessments, MySQL, Command-Line Interface, PostgreSQL, and Database Management

What you'll learn

  • Set up pentesting labs and perform advanced Nmap reconnaissance.

  • Build Python scanners, exploit SMTP, Samba, and NFS services.

  • Apply malware analysis, social engineering, and automation scripts.

Skills you'll gain

Penetration Testing, Exploitation techniques, Automation, Mobile Security, Network Analysis, Malware Protection, Scripting, Cyber Operations, Vulnerability Assessments, Cyber Security Assessment, Virtual Environment, Authentications, Android (Operating System), and Command-Line Interface

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

EDUCBA
EDUCBA
516 Courses127,159 learners

Offered by

EDUCBA

Compare with similar products

Rating
Level
Skills
Tools
Last updated
Number of practice exercises
Degree eligibility
Part of Coursera Plus

You might also like

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions