This course will teach you about Kali Linux, a popular tool used to discover threats and vulnerabilities in computer systems and networks.
This course will teach you about Kali Linux, a popular tool used to discover threats and vulnerabilities in computer systems and networks.
Kali Linux is a very popular operating system and tool platform used by cybersecurity professionals for discovering threats and weaknesses in computer information systems and networks. In this course, Kali Linux Concepts and Basic Functionality, you’ll learn what Kali Linux is and why it is so useful to professional “ethical hackers” for solving problems caused by both cyber-threats and software weaknesses in computer systems. First, you'll explore what Kali Linux is, who uses Kali, and discover Kali’s many uses to cybersecurity professions. Next, you'll cover, step by step, how to install and configure Kali Linux in a virtualized environment that you can run in your own home ethical hacking lab. Finally, you'll learn about all of the tools and capabilities you can install in Kali that you need to get your ethical hacking tasks completed. When you’re finished with this course, you’ll have the sufficient skills and knowledge of Kali Linux needed to begin using Kali in your own cybersecurity job, and start down the path of getting a job as an ethical hacker.
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.