TrueschoTruescho
All Courses
Ethical Hacking with Kali Linux: Analyze & Defend
Coursera
Course
Unknown

Ethical Hacking with Kali Linux: Analyze & Defend

EDUCBA

By the end of this course, learners will be able to perform advanced reconnaissance using Nmap and DNS tools, evaluate social engineering and phishing techniques, differentiate between malware types, and simulate backdoor exploitation with persistence strategies. The course emphasizes hands-on application in Kali Linux, enabling students to develop practical penetration testing skills. Participants will benefit from structured, module-wise learning that covers both technical and human-centric a

Unknown3 weeks

About this Course

By the end of this course, learners will be able to perform advanced reconnaissance using Nmap and DNS tools, evaluate social engineering and phishing techniques, differentiate between malware types, and simulate backdoor exploitation with persistence strategies. The course emphasizes hands-on application in Kali Linux, enabling students to develop practical penetration testing skills. Participants will benefit from structured, module-wise learning that covers both technical and human-centric a

What You'll Learn

  • Perform advanced reconnaissance using Nmap, DNS, and OSINT tools
  • Analyze phishing, social engineering, and malware techniques.
  • Simulate backdoor exploitation and persistence strategies.

Instructors

E

EDUCBA

Course Info

PlatformCoursera
LevelUnknown
PacingUnknown
PriceFree

Skills

Vulnerability Assessments
Malware Protection
Network Analysis
Cyber Threat Intelligence
Penetration Testing
Command-Line Interface
Human Factors (Security)
Exploitation techniques
Cybersecurity
Intrusion Detection and Prevention

Start Learning Now