Learn ethical hacking through Kali Linux, one of the leading computer security operating systems, and discover how to gather information, detect vulnerabilities, and exploit them using tools in Kali Linux.
An Introduction to Ethical Hacking with Kali Linux
Instructor: Packt - Course Instructors
Included with
Recommended experience
What you'll learn
Set up Kali Linux on your system
Use the DNS toolkit in Kali Linux
Learn about network security scanning (Nmap)
Skills you'll gain
Details to know
Add to your LinkedIn profile
September 2024
1 assignment
See how employees at top companies are mastering in-demand skills
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 4 modules in this course
In this module, we will lay the foundation for your journey into cybersecurity by setting up all the necessary tools and environments. You will start by understanding the course overview, followed by installing Kali Linux, setting up virtual machines, and configuring web servers and vulnerable applications.
What's included
4 videos1 reading
In this module, we will delve into the critical phase of information gathering, a foundational step in any cybersecurity assessment. You will learn to analyze DNS, detect IDS and IPS, identify live hosts, and use various tools like network and port scanners, Enum4Linux, Dmitry, Recon-ng, and Sparta to collect essential data about your targets.
What's included
9 videos
In this module, we will focus on vulnerability analysis, a crucial step in identifying and addressing security weaknesses. You will learn to use tools like Nikto for web server scanning and unix-privesc-check to detect privilege escalation vulnerabilities on Unix systems. This section will equip you with the skills to analyze scan results and implement effective security measures.
What's included
2 videos
In this module, we will dive into web application analysis and exploitation, which is essential for understanding and securing web environments. You will learn to use tools like wpscan, Burp Suite, Wfuzz, Commix, Sqlmap, and Metasploit to uncover and exploit vulnerabilities in web applications. This section will equip you with the skills to conduct thorough security assessments and enhance web application defenses.
What's included
6 videos1 assignment
Instructor
Offered by
Recommended if you're interested in Computer Security and Networks
Why people choose Coursera for their career
New to Computer Security and Networks? Start here.
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.