Kali is a specialized Linux distribution designed for security researchers and penetration testers. This Skill Tree offers a comprehensive learning path for mastering Kali Linux. Itโs perfect for beginners in cybersecurity, providing a structured roadmap to understand penetration testing, ethical hacking, and security auditing. Through hands-on, non-video courses and practical exercises in an interactive Kali environment, youโll gain real-world experience in security testing and vulnerability assessment.
34 skills|6 courses
Kali Linux for Beginners
Kali Linux for Beginners
Beginner
KaliLinux
In this course, learn the fundamentals of Kali Linux. Explore basic navigation, networking tools, security tools, and system management. Perfect for beginners!
In this course, you will learn about Nmap, a powerful network scanning tool that is used to discover hosts and services on a computer network.
0 lab
Quick Start with Wireshark
Beginner
Cybersecurity
In this course, you will learn how to use Wireshark to capture and analyze network traffic. You will learn how to install Wireshark, capture packets, and analyze them. You will also learn how to use Wireshark to troubleshoot network issues, analyze network traffic, and secure your network.
0 lab
Hydra for Beginners
Beginner
CybersecurityHydra
In this course, learn the fundamentals of using Hydra, a powerful password cracking tool. Explore installation, basic commands, and attack various services like SSH, HTTP, FTP, and Telnet.
0 lab
Kali Linux Security Labs
Beginner
cybersecurityKaliLinux
In this course, learn practical cybersecurity skills using Kali Linux. Explore reconnaissance, vulnerability scanning, password cracking, web testing, exploitation, and more through hands-on labs.
0 lab
Kali Server Exploitation in Action
Beginner
CybersecurityPen Testing
This course covers penetration testing and ethical hacking with Kali Linux. Key topics include exploiting vulnerabilities via Metasploit, scanning and exploiting network services, brute-forcing remote access, developing custom scanners, attacking vulnerabilities like IngressLock, Samba, and Unreal IRCd, creating malicious PDFs, and privilege escalation. Through hands-on labs, you'll gain end-to-end pentesting skills - information gathering, vulnerability analysis, exploitation, and maintaining access.