Ethical Hacking with Kali Linux: Analyze & Defend
By the end of this course, learners will be able to perform advanced reconnaissance using Nmap and DNS tools, evaluate social engineering and phishing techniques, differentiate between malware types, and simulate backdoor exploitation with persistence strategies. The course emphasizes hands-on application in Kali Linux, enabling students to develop practical penetration testing skills.
Participants will benefit from structured, module-wise learning that covers both technical and human-centric aspects of cybersecurity. From gathering domain intelligence with OSINT tools to analyzing phishing a…
Watch on Coursera ↗
(saves to browser)
DeepCamp AI