Ethical Hacking with Kali Linux: Analyze & Defend

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Ethical Hacking with Kali Linux: Analyze & Defend

Coursera · Intermediate ·🔐 Cybersecurity ·1mo ago
By the end of this course, learners will be able to perform advanced reconnaissance using Nmap and DNS tools, evaluate social engineering and phishing techniques, differentiate between malware types, and simulate backdoor exploitation with persistence strategies. The course emphasizes hands-on application in Kali Linux, enabling students to develop practical penetration testing skills. Participants will benefit from structured, module-wise learning that covers both technical and human-centric aspects of cybersecurity. From gathering domain intelligence with OSINT tools to analyzing phishing attacks and defending against rootkits, the course equips learners with actionable skills used by professional ethical hackers. What makes this course unique is its balance between technical demonstrations and real-world attack simulations. Learners will not only understand how attacks occur but also practice defending against them in a controlled environment. This dual perspective—attacker and defender—ensures a comprehensive understanding of penetration testing and cybersecurity defense strategies.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Stop Blindly Disabling CSRF — Dynamic CSRF Configuration in Spring Security 6
Learn to dynamically configure CSRF protection in Spring Security 6 for hybrid enterprise APIs, replacing global disable strategies
Medium · Cybersecurity
The OpenAI Breach Wasn't About OpenAI – It Was About the 84 Packages Above Them
The OpenAI breach highlights the importance of securing dependencies in the software supply chain, affecting 84 packages above them
Dev.to · Dimitris Kyrkos
Years of Apple's Best Security Work, Cracked in Five Days — Here's What Developers Should Know
Apple's best security measures were cracked in five days, highlighting the importance of ongoing security efforts for developers
Dev.to · ArshTechPro
TorCT PHP RAT 2026
Learn about TorCT PHP RAT, a stealthy Remote Access Trojan written in PHP that operates without port forwarding, and understand its implications for cybersecurity.
Dev.to AI
Up next
Cryptography
Coursera
Watch →