In this comprehensive course, you'll embark on a journey through the world of ethical hacking. The initial modules guide you through setting up a secure pentesting lab environment, including installing VirtualBox and Kali Linux. These foundational steps ensure you're equipped with the necessary tools and knowledge to begin your hacking journey. The course then delves into Linux essentials, offering a thorough introduction to basic commands critical for navigating the Kali Linux environment, a favorite among cybersecurity professionals.
Ethical Hacking Foundations
This course is part of The Complete Ethical Hacking Bootcamp: Beginner To Advanced Specialization
Instructor: Packt - Course Instructors
Sponsored by Louisiana Workforce Commission
(10 reviews)
Recommended experience
What you'll learn
Explain the purpose and usage of basic and advanced Linux commands.
Utilize networking terminology and tools in practical scenarios.
Examine techniques for passive information gathering using various tools.
Develop a basic ethical hacking plan incorporating the learned concepts.
Details to know
Add to your LinkedIn profile
3 assignments
September 2024
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 5 modules in this course
In this module, we will provide an overview of the Ethical Hacking Foundations course, discussing its goals, the importance of ethical hacking, and the key topics that will be covered throughout the program.
What's included
1 video1 reading
In this module, we will guide you through the process of setting up a pentesting lab. You'll learn to install VirtualBox and Kali Linux, configure VirtualBox Guest Additions, create a bootable Kali USB flash drive, and complete important post-installation steps to ensure your setup is ready for ethical hacking practices.
What's included
5 videos
In this module, we will delve into essential Linux commands that are crucial for any ethical hacker. Through a series of videos, you'll gain hands-on experience with basic to advanced command-line operations in Kali Linux, enhancing your ability to navigate and manipulate the system effectively.
What's included
3 videos1 assignment
In this module, we will cover fundamental networking concepts and terminologies essential for ethical hacking. You'll learn how to change your IP address, set up your wireless adapter, and familiarize yourself with both networking and hacking terminologies used in the field.
What's included
3 videos
In this module, we will focus on passive information gathering and footprinting techniques. You'll explore tools like Google, whois, the harvester, and Shodan to gather crucial information. Additionally, you'll learn to perform DNS zone transfers using 'dig', enhancing your ability to collect data discreetly.
What's included
5 videos1 reading2 assignments
Instructor
Offered by
Why people choose Coursera for their career
Learner reviews
10 reviews
- 5 stars
80%
- 4 stars
10%
- 3 stars
10%
- 2 stars
0%
- 1 star
0%
Showing 3 of 10
Reviewed on Nov 18, 2024
Excellent course for beginners. Very helpful reading materials and assessments!
Recommended if you're interested in Computer Science
LearnKartS
Johns Hopkins University
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy