Kali Linux is the go-to operating system for penetration testers, ethical hackers, and security professionals. This course blends cybersecurity knowledge with practical applications to give you the job-ready skills you need to use Kali Linux effectively in just 5 weeks!



Ethical Hacking with Kali Linux
This course is part of IBM Ethical Hacking with Open Source Tools Professional Certificate


Instructors: IBM Skills Network Team
Included with
Recommended experience
What you'll learn
Job-ready skills to effectively use Kali Linux security and penetration testing tools for ethical hacking in just 5 weeks
Perform penetration tests using Kali Linux, applying various tools and techniques to assess vulnerabilities in controlled environments
Configure virtual machines and customize Kali Linux security tools to create safe, efficient, and adaptable testing environments
Automate maintenance, security, and penetration tasks using command-line tools and scripting to optimize system performance and security
Skills you'll gain
- Cyber Security Assessment
- Hardening
- Cybersecurity
- Scripting
- Linux
- Vulnerability Assessments
- Information Systems Security Assessment Framework (ISSAF)
- System Configuration
- Software Installation
- Linux Commands
- Vulnerability Scanning
- Intrusion Detection and Prevention
- Linux Administration
- Shell Script
- Command-Line Interface
- Automation
- Penetration Testing
- Security Testing
- Network Monitoring
- Bash (Scripting Language)
Details to know

Add to your LinkedIn profile
May 2025
12 assignments
See how employees at top companies are mastering in-demand skills

Build your Security expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate from IBM


Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review

There are 5 modules in this course
This module will kickstart your cybersecurity journey by helping you master the essentials of Kali Linux, the go-to platform for penetration testing. In this module, you’ll explore its architecture, install and configure Kali Linux in a virtualized environment, and learn best practices for optimizing your setup. Dive into securing your system by hardening Kali Linux, protecting your home lab, and utilizing built-in tools for system protection. Through hands-on activities and optional labs, you’ll gain practical experience in installation, configuration, and security. Finally, you’ll have a secure, fully functional Kali Linux environment ready for advanced tasks.
What's included
6 videos6 readings3 assignments7 plugins
In this module, you’ll dive deep into the powerful cybersecurity tools included in Kali Linux, gaining hands-on experience in investigation, exploitation, and penetration testing. You’ll explore tools for information gathering, forensics, and vulnerability analysis, enabling you to identify and assess security risks effectively. Additionally, you’ll learn to use exploitation tools, perform sniffing and spoofing attacks, and discover the capabilities of Kali NetHunter for mobile penetration testing. Through hands-on activities, you’ll practice using these tools in real-world scenarios, including optional labs for advanced exploration. By the end of this module, you’ll have the skills to investigate vulnerabilities, exploit security weaknesses, and leverage Kali Linux’s tools to strengthen your cybersecurity expertise.
What's included
6 videos2 readings3 assignments8 plugins
In this module, you’ll unlock the full potential of Kali Linux by learning to automate tasks and customize tools using scripting. You’ll start with the basics of Python and Bash, two powerful scripting languages, and gain hands-on experience writing scripts to automate maintenance and security tasks. You’ll also learn to write basic scripts, automate security workflows, and modify existing Kali Linux tools to suit your needs. By the end of this module, you’ll be able to create Python scripts for security automation, write Bash scripts for system maintenance, and customize Kali Linux tools to enhance their functionality. These skills will empower you to streamline your workflows and tackle complex cybersecurity challenges with efficiency and precision.
What's included
6 videos2 readings3 assignments5 app items7 plugins
In this module, you’ll apply your knowledge and hands-on skills from the course by completing a final project. You’ll tackle real-world tasks, including planning, developing, and testing a custom script to automate a common cybersecurity or maintenance task. This project will challenge you to integrate scripting, tool customization, and automation techniques you’ve learned, showcasing your ability to solve practical problems efficiently. By the end, you’ll have a functional script and a deeper understanding of how automation can streamline workflows in cybersecurity and ethical hacking.
What's included
2 videos2 readings1 assignment2 app items1 plugin
This module introduces you to the Linux operating system, a cornerstone of cybersecurity and ethical hacking. You’ll explore the architecture of Linux, understand the differences between popular distributions, and gain hands-on experience with the Linux Terminal. Learn essential commands for navigating files and directories, managing system information, and configuring access controls. Through interactive labs, you’ll practice browsing directories, managing file permissions, and implementing access controls, building a strong foundation for working in Linux environments. By the end of this module, you’ll be proficient in using the Linux Terminal and managing system resources effectively.
What's included
5 videos3 readings2 assignments3 app items6 plugins
Instructors


Offered by
Explore more from Security
Why people choose Coursera for their career




New to Security? Start here.

Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Kali Linux is a free, open-source Linux distribution built for cybersecurity tasks like ethical hacking and penetration testing. It’s popular because it comes preloaded with hundreds of tools, is regularly updated, and is trusted by security professionals worldwide.
Cybersecurity professionals, ethical hackers, and IT teams use Kali Linux to test system security, find vulnerabilities, and practice real-world hacking techniques in safe environments. It’s also widely used by students learning ethical hacking.
Kali Linux offers an all-in-one toolkit for security testing, backed by a strong community and regular updates. It saves time, supports advanced testing workflows, and is trusted across the industry for hands-on security work.
More questions
Financial aid available,