Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Ethical Hacking with Kali Linux: Analyze & Defend

EDUCBA via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
By the end of this course, learners will be able to perform advanced reconnaissance using Nmap and DNS tools, evaluate social engineering and phishing techniques, differentiate between malware types, and simulate backdoor exploitation with persistence strategies. The course emphasizes hands-on application in Kali Linux, enabling students to develop practical penetration testing skills. Participants will benefit from structured, module-wise learning that covers both technical and human-centric aspects of cybersecurity. From gathering domain intelligence with OSINT tools to analyzing phishing attacks and defending against rootkits, the course equips learners with actionable skills used by professional ethical hackers. What makes this course unique is its balance between technical demonstrations and real-world attack simulations. Learners will not only understand how attacks occur but also practice defending against them in a controlled environment. This dual perspective—attacker and defender—ensures a comprehensive understanding of penetration testing and cybersecurity defense strategies.

Syllabus

  • Network Reconnaissance and Footprinting
    • This module introduces students to essential reconnaissance techniques used in ethical hacking. Learners will explore Nmap scanning, WHOIS lookups, DNS enumeration, and OSINT tools such as The Harvester, Urlcrazy, dnsdict6, and Dnsrecon. By the end of the module, participants will be able to perform professional-grade information gathering and footprinting to map networks effectively.
  • Social Engineering and Malware Threats
    • This module explores the human factor of cybersecurity, focusing on social engineering attacks such as phishing, spear-phishing, and mass mailer techniques. Learners will also study the behavior of computer malware, including viruses, worms, Trojans, and other malicious software. The module emphasizes recognizing, evaluating, and mitigating these threats in real-world penetration testing scenarios.
  • Backdoors, Rootkits, and Maintaining Access
    • This module covers advanced exploitation techniques used to gain and maintain unauthorized access. Students will study historical viruses, rootkits, and backdoor mechanisms. They will also learn persistence strategies attackers use to retain control over compromised systems, alongside defensive practices for detection and prevention.

Taught by

EDUCBA

Reviews

5 rating at Coursera based on 15 ratings

Start your review of Ethical Hacking with Kali Linux: Analyze & Defend

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.