Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Kali Linux is the go-to operating system for penetration testers, ethical hackers, and security professionals. This course blends cybersecurity knowledge with practical applications to give you the job-ready skills you need to use Kali Linux effectively in just 5 weeks!
Ethical hackers—also known as “white hat” hackers—test systems and networks to uncover vulnerabilities. They often use Kali Linux to conduct network monitoring, penetration testing, and security auditing, as it provides hundreds of pre-installed tools to practice reconnaissance and analysis.
During the course, you’ll get an overview of the Kali Linux operating system and learn how to install and configure it. You’ll then dive into automation options, explore both Bash and Python scripting languages, and discover how to customize configurations to meet your specific needs.
To get the most from the course, foundational cybersecurity knowledge is required. Our Information Technology (IT) Fundamentals for Everyone and Cybersecurity Fundamentals Specialization provide the ideal grounding.
If you’re looking to leverage the power of Kali Linux in your ethical hacking career, enroll today!
Syllabus
- Overview of Kali Linux
- This module will kickstart your cybersecurity journey by helping you master the essentials of Kali Linux, the go-to platform for penetration testing. In this module, you’ll explore its architecture, install and configure Kali Linux in a virtualized environment, and learn best practices for optimizing your setup. Dive into securing your system by hardening Kali Linux, protecting your home lab, and utilizing built-in tools for system protection. Through hands-on activities and optional labs, you’ll gain practical experience in installation, configuration, and security. Finally, you’ll have a secure, fully functional Kali Linux environment ready for advanced tasks.
- Kali Linux Tools
- In this module, you’ll dive deep into the powerful cybersecurity tools included in Kali Linux, gaining hands-on experience in investigation, exploitation, and penetration testing. You’ll explore tools for information gathering, forensics, and vulnerability analysis, enabling you to identify and assess security risks effectively. Additionally, you’ll learn to use exploitation tools, perform sniffing and spoofing attacks, and discover the capabilities of Kali NetHunter for mobile penetration testing. Through hands-on activities, you’ll practice using these tools in real-world scenarios, including optional labs for advanced exploration. By the end of this module, you’ll have the skills to investigate vulnerabilities, exploit security weaknesses, and leverage Kali Linux’s tools to strengthen your cybersecurity expertise.
- Scripting and Automation
- In this module, you’ll unlock the full potential of Kali Linux by learning to automate tasks and customize tools using scripting. You’ll start with the basics of Python and Bash, two powerful scripting languages, and gain hands-on experience writing scripts to automate maintenance and security tasks. You’ll also learn to write basic scripts, automate security workflows, and modify existing Kali Linux tools to suit your needs. By the end of this module, you’ll be able to create Python scripts for security automation, write Bash scripts for system maintenance, and customize Kali Linux tools to enhance their functionality. These skills will empower you to streamline your workflows and tackle complex cybersecurity challenges with efficiency and precision.
- Final Project and Course Wrap-Up
- In this module, you’ll apply your knowledge and hands-on skills from the course by completing a final project. You’ll tackle real-world tasks, including planning, developing, and testing a custom script to automate a common cybersecurity or maintenance task. This project will challenge you to integrate scripting, tool customization, and automation techniques you’ve learned, showcasing your ability to solve practical problems efficiently. By the end, you’ll have a functional script and a deeper understanding of how automation can streamline workflows in cybersecurity and ethical hacking.
- (Optional) Overview of the Linux Operating System
- This module introduces you to the Linux operating system, a cornerstone of cybersecurity and ethical hacking. You’ll explore the architecture of Linux, understand the differences between popular distributions, and gain hands-on experience with the Linux Terminal. Learn essential commands for navigating files and directories, managing system information, and configuring access controls. Through interactive labs, you’ll practice browsing directories, managing file permissions, and implementing access controls, building a strong foundation for working in Linux environments. By the end of this module, you’ll be proficient in using the Linux Terminal and managing system resources effectively.
Taught by
IBM Skills Network Team and Dee Dee Collette