This course provides a comprehensive introduction to ethical hacking and network security. By completing this course, learners will acquire the foundational skills necessary to secure networks and systems, along with the hands-on experience to implement key cybersecurity techniques. With practical lessons on setting up hacking labs, using Kali Linux, and performing penetration testing, students will be well-equipped to identify and mitigate network vulnerabilities.



Ethical Hacking Foundations & Network Security
This course is part of The Complete Ethical Hacking Course Specialization

Instructor: Packt - Course Instructors
Included with
Recommended experience
What you'll learn
Set up a safe virtual environment for ethical hacking using Kali Linux and Virtualbox
Understand the key tools and techniques used in ethical hacking, including Wireshark, nMap, and Metasploit
Perform penetration testing on networks, wireless systems, and vulnerable targets to identify security gaps
Enhance online anonymity through VPNs, DNS management, and dark web exploration
Skills you'll gain
Details to know

Add to your LinkedIn profile
May 2025
11 assignments
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate


Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review

There are 11 modules in this course
In this module, we will provide an overview of the course and introduce the course manual, which will be a vital resource for supporting your ethical hacking journey. We’ll guide you through the learning structure, ensuring you are prepared for the technical topics ahead.
What's included
1 video2 readings
In this module, we will walk you through the essential steps of setting up a hacking lab, including virtual machine installation and configuring Kali Linux. You'll also learn to troubleshoot installation issues and make use of snapshots to ensure a secure environment for learning and experimentation.
What's included
12 videos1 assignment
In this module, we will cover the basics of Kali Linux, familiarizing you with the interface, essential tools, and navigation methods. You'll also learn key Linux concepts such as file management, permissions, and system configuration.
What's included
10 videos1 assignment
In this module, we will focus on how to maintain your anonymity online, utilizing tools like VPNs and DNS to safeguard your privacy. You’ll gain a strong understanding of online anonymity and how to address common privacy-related challenges.
What's included
6 videos1 assignment
In this module, we will introduce you to the dark web, focusing on its structure, potential dangers, and best practices for secure access. You will also learn to install and use Tor to ensure your anonymity while exploring the dark web.
What's included
5 videos1 assignment
In this module, we will introduce you to network penetration testing, covering foundational concepts and tools. You will learn about network reconnaissance, WiFi setup, and critical techniques for identifying security weaknesses in networks.
What's included
7 videos1 assignment
In this module, we will dive into network reconnaissance and sniffing, focusing on techniques like Airodump-ng and deauthentication attacks. You will gain practical experience in gathering and analyzing network information to identify potential vulnerabilities.
What's included
4 videos1 assignment
In this module, we will explore various wireless network attacks, focusing on techniques for cracking WEP, WPA, and WPA2. You'll also learn how to capture key data for encryption cracking and how to strengthen wireless network security.
What's included
11 videos1 assignment
In this module, we will cover post-connection attacks, focusing on tools for network reconnaissance, such as nMap and Wireshark. You’ll also learn techniques for intercepting network traffic and how to protect against such attacks.
What's included
14 videos1 assignment
In this module, we will introduce system penetration testing, guiding you through practical exercises like scanning with nMap and exploiting vulnerabilities. You will learn to use Metasploit and other tools to penetrate vulnerable systems securely.
What's included
11 videos1 assignment
In this module, we will explore how ChatGPT can enhance your penetration testing skills. You will learn how to use it to analyze scan results, identify vulnerabilities, and execute advanced techniques like privilege escalation.
What's included
4 videos1 reading2 assignments
Instructor

Offered by
Explore more from Computer Security and Networks
Why people choose Coursera for their career




New to Computer Security and Networks? Start here.

Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
More questions
Financial aid available,