Skip to content

Kali Linux Tutorial for Ethical Hacking & Penetration Test

Provided by Oak Academy

Summary

Price
£49 inc VAT
Study method
Online, On Demand What's this?
Duration
7 hours · Self-paced
Qualification
No formal qualification
Certificates
  • Reed Courses Certificate of Completion - Free
Additional info
  • Tutor is available to students

Add to basket or enquire

Overview


Hello to everyone!

Welcome to the "Kali Linux Tutorial for Ethical Hacking & Penetration Test" course

Mastering Kali Linux for Ethical Hackers and Penetration Testers with tools like Wireshark, NMAP, Metasploit, Burp Suite

Today, many critical systems continue to work on the Linux operating system Because Linux operating systems are very stable and can work without interruption With the development of the Internet, Linux operating systems have developed and started to use the Windows concept

Kali Linux is a pre-packaged Linux distribution built around the Linux kernel Kali Linux is designed specifically for ethical hacking and penetration testing tasks, and features a host of free and open-source security tools and applications like Metasploit and Nmap.

Kali Linux is an open-source, Debian-based Linux distribution released in March of 2013, primarily created for advanced Penetration Testing and Security Auditing. It used to be known as BackTrack Linux. Kali Linux contains hundreds of tools that perform various information security tasks, such as computer forensics, reverse engineering, security research, and penetration testing. It provides a multi-platform solution that is freely available and accessible to both professionals and hobbyists in the information technology industry.

Ethical hacking is a popular expertise thanks to the stylization of white hat hackers as heroes in pop television and movies. In real life, ethical hacking is just as valiant, and Kali Linux is a powerful tool for getting the job done. OAK Academy features top-rated Kali Linux courses to help you don your white hat.

Advanced computer knowledge is no longer required to use a Linux operating system

Anyone at the beginner level can take this course And this course will take you even further This course is a practical course You'll learn some theory first and then have the chance to apply what you've learned

In the "Kali Linux For Beginners" course, you will learn;

  • How to install Kali Linux?

  • What are default Kali Linux programs and how to use them?

  • How to set up a new program?

  • How are updates of existing programs done?

  • You will learn how to change the Kali Linux installation settings

  • How to use the terminal?

  • Linux Distributions

  • Pieces of Linux

  • Shell

  • Linux Signs: $, #, %, ~

  • Linux Desktop Environments

  • Linux File Hierarchy

  • Kali Linux GUI

  • Download and Install Kali Linux Environment (Kali Linux VirtualBox, Image File, Metasploitable Image File, OWASP Image File, Nat Network)

  • Basic Linux Commands

  • Configuring Kali Linux

  • Kali Linux Package Management

  • Monitoring

  • Network Scanning Tools in Kali

  • MSF Fundamentals

  • Password Cracking Tools in Kali Linux

  • Information Gathering Tools in Kali

  • Web App Hacking Tools in Kali

The instructor does a great job of explaining Linux commands using small and concise examples.

In this course, starting from fundamental command-line operations to virtualization technologies and system installations. Throughout the course, you will gain hands-on experience with essential tools like Wireshark, Nmap, Metasploit, and Hashcat, without diving too deeply into each tool. Instead, We've curated tutorial videos that provide comprehensive yet approachable explanations of these tools' functionalities and practical usage. By the end of this course, you can expect to have a solid understanding of Linux command-line operations, virtualization techniques, and proficiency in using key security tools for network scanning, exploitation, and password cracking. Whether you're a beginner looking to build foundational knowledge or an intermediate learner seeking to enhance your cybersecurity skill set, this course will equip you with the necessary skills to navigate the Linux environment and perform basic security assessments effectively.

What is Kali Linux?

Kali Linux is an open-source, Debian-based Linux distribution released in March of 2013, primarily created for advanced Penetration Testing and Security Auditing. It used to be known as BackTrack Linux Kali Linux contains hundreds of tools that perform various information security tasks, such as computer forensics, reverse engineering, security research, and penetration testing. It provides a multi-platform solution that is freely available and accessible to both professionals and hobbyists in the information technology industry.

See you in the course!

Certificates

Reed Courses Certificate of Completion

Digital certificate - Included

Will be downloadable when all lectures have been completed.

Curriculum

14
sections
101
lectures
7h 2m
total
    • 1: What is Linux? 01:32
    • 2: FAQ regarding Linux 04:00
    • 3: Distributions 01:22
    • 4: Pieces of Linux 02:58
    • 5: Shell 02:09
    • 6: Linux Signs: $, #, %, ~ 00:58
    • 7: Linux Desktop Environments 01:52
    • 8: Linux File Hierarchy 02:56
    • 9: FAQ regarding Ethical Hacking 04:00
    • 10: Quiz 01:00
    • 11: What is Linux Kali? 01:54
    • 12: Kali Linux GUI 03:25
    • 13: Download and Install VirtualBOX 02:03
    • 14: Download and Install Kali Linux -VirtualBox 07:36
    • 15: Download and Install Kali Linux Image File 02:40
    • 16: Download and add Metasploitable Image File 02:40
    • 17: OWASP Image File-2 Download and Add VirtualBOX 04:20
    • 18: Create Nat Network and Connections Test with VirtualBox 07:32
    • 19: VmWare Download and Install 01:55
    • 20: Kali Linux Install VMWare 05:39
    • 21: Kali Image File Add VmWare 02:02
    • 22: Metasploitable Add VmWare 02:15
    • 23: Owasp Add VmWare 02:12
    • 24: Create Nat Network and Connections Test with VmWare 06:12
    • 25: Command Parameters 02:19
    • 26: List Files - "ls" Command 04:34
    • 27: Print Working Directory - "pwd" Command 00:55
    • 28: Show Manuel - "man" Command 02:11
    • 29: Change Directory - "cd" Command 02:18
    • 30: Concatenate Files - "cat" Command 02:16
    • 31: ECHO Command 01:34
    • 32: View the File with "more" Command 02:22
    • 33: View the File with "less" Command 01:23
    • 34: Print First Lines with "head" Command 01:15
    • 35: Print Last Lines with "tail" Command 01:39
    • 36: Global Regular Expression Print - "grep" Command 03:35
    • 37: Unix Name - "uname" Command 00:47
    • 38: Output Redirection 02:37
    • 39: Output Redirection : Pipe “|” 02:17
    • 40: Make Directory - "mkdir" Command 01:21
    • 41: Create File & Modify Date - "touch" Command 01:20
    • 42: Remove Files or Directories - "rm" Command 02:07
    • 43: Copy and Move Files or Directories - "cp" & "mv" Command 01:58
    • 44: Find Files and Directories - "find" Command 02:24
    • 45: Cut Parts of Lines - "cut" Command 02:51
    • 46: Change Ownership of a Given File - "chown" Command 01:32
    • 47: Quiz 01:00
    • 48: Configuring Services 03:42
    • 49: User Management 02:38
    • 50: Package Management Concepts 02:56
    • 51: Foremost Linux Package Managers 02:30
    • 52: Repository (a.k.a. Repo) 00:49
    • 53: “apt-get” Package Manager 06:08
    • 54: Debian Packages "dpkg" 02:26
    • 55: Install from Source Code 02:26
    • 56: System Monitoring 06:59
    • 57: Status of Network 01:49
    • 58: Firewall or Packet Filtering & Creating Rules 05:52
    • 59: Quiz 01:00
    • 60: Wireshark: Capturing the Traffic 08:34
    • 61: Wireshark: Following Stream 02:40
    • 62: Wireshark: Summarise Network 06:19
    • 63: HTTP 03:20
    • 64: HTTPs 01:56
    • 65: HTTP&HTTPs 03:43
    • 66: Introduction to TCPDump 05:26
    • 67: TCPDump in Action 09:06
    • 68: Hping for Active Scan and DDoS Attacks 07:53
    • 69: Nmap Introduction 04:12
    • 70: Nmap: Ping Scan to Enumerate Network Hosts 05:02
    • 71: Nmap: SYN Scan 07:31
    • 72: Nmap: Port Scan 08:09
    • 73: Nmap: TCP Scan 07:15
    • 74: Nmap: UDP Scan 04:15
    • 75: Nmap: Version Detection 06:42
    • 76: Nmap: Operating System Detection 06:02
    • 77: Nmap: Input-Output Management 08:31
    • 78: Ettercap 10:34
    • 79: Quiz 02:00
    • 80: Introduction to MSF 01:25
    • 81: Msfconsole Exploit Search & Ranking 07:46
    • 82: MSF Console: Configure & Run an Exploit 07:51
    • 83: Metaspolit on TryHackMe 28:08
    • 84: Hydra: Cracking the Password of a Web App 10:01
    • 85: Hydra Online SSH Password Cracking 06:28
    • 86: John The Ripper 07:28
    • 87: Hashcat 04:40
    • 88: Hashcat on TryHackMe 10:49
    • 89: Quiz 01:00
    • 90: The Harvester & Recon-NG 03:15
    • 91: Maltego - Visual Link Analysis Tool 07:09
    • 92: Dnsenum/Dnsrecon 05:24
    • 93: Netdiscover 02:17
    • 94: Web Site Haching (GATHERING BASIC WITH WHOIS) 08:17
    • 95: Quiz 01:00
    • 96: What is Web Pentesting? 05:17
    • 97: Web Pentesting Tools 09:11
    • 98: Burp Suite: Intercepting the HTTP Traffic 03:48
    • 99: Burp Suite: Intercepting the HTTPS Traffic 02:54
    • 100: Social Engineering Toolkit (SET) for Phishing 06:34
    • 101: Quiz 01:00

Course media

Description


Hello to everyone!

Welcome to the "Kali Linux Tutorial for Ethical Hacking & Penetration Test" course

Mastering Kali Linux for Ethical Hackers and Penetration Testers with tools like Wireshark, NMAP, Metasploit, Burp Suite

Today, many critical systems continue to work on the Linux operating system Because Linux operating systems are very stable and can work without interruption With the development of the Internet, Linux operating systems have developed and started to use the Windows concept

Kali Linux is a pre-packaged Linux distribution built around the Linux kernel Kali Linux is designed specifically for ethical hacking and penetration testing tasks, and features a host of free and open-source security tools and applications like Metasploit and Nmap.

Kali Linux is an open-source, Debian-based Linux distribution released in March of 2013, primarily created for advanced Penetration Testing and Security Auditing. It used to be known as BackTrack Linux. Kali Linux contains hundreds of tools that perform various information security tasks, such as computer forensics, reverse engineering, security research, and penetration testing. It provides a multi-platform solution that is freely available and accessible to both professionals and hobbyists in the information technology industry.

Ethical hacking is a popular expertise thanks to the stylization of white hat hackers as heroes in pop television and movies. In real life, ethical hacking is just as valiant, and Kali Linux is a powerful tool for getting the job done. OAK Academy features top-rated Kali Linux courses to help you don your white hat.

Advanced computer knowledge is no longer required to use a Linux operating system

Anyone at the beginner level can take this course And this course will take you even further This course is a practical course You'll learn some theory first and then have the chance to apply what you've learned

In the "Kali Linux For Beginners" course, you will learn;

  • How to install Kali Linux?

  • What are default Kali Linux programs and how to use them?

  • How to set up a new program?

  • How are updates of existing programs done?

  • You will learn how to change the Kali Linux installation settings

  • How to use the terminal?

  • Linux Distributions

  • Pieces of Linux

  • Shell

  • Linux Signs: $, #, %, ~

  • Linux Desktop Environments

  • Linux File Hierarchy

  • Kali Linux GUI

  • Download and Install Kali Linux Environment (Kali Linux VirtualBox, Image File, Metasploitable Image File, OWASP Image File, Nat Network)

  • Basic Linux Commands

  • Configuring Kali Linux

  • Kali Linux Package Management

  • Monitoring

  • Network Scanning Tools in Kali

  • MSF Fundamentals

  • Password Cracking Tools in Kali Linux

  • Information Gathering Tools in Kali

  • Web App Hacking Tools in Kali

At the end of this course;

  • You will be able to change the Kali Linux operating system settings,

  • You will learn how to use the necessary programs for your daily work

  • You will learn how to run the most used hacker programs

  • Using linux, kali linux, linux administration, linux command line, kali

  • kali linux, oscp, kali, linux, ceh, everything about kali linux os, kali linux tutorial, penetration testing, ethical hacking

The instructor does a great job of explaining Linux commands using small and concise examples.

In this course, starting from fundamental command-line operations to virtualization technologies and system installations. Throughout the course, you will gain hands-on experience with essential tools like Wireshark, Nmap, Metasploit, and Hashcat, without diving too deeply into each tool. Instead, We've curated tutorial videos that provide comprehensive yet approachable explanations of these tools' functionalities and practical usage. By the end of this course, you can expect to have a solid understanding of Linux command-line operations, virtualization techniques, and proficiency in using key security tools for network scanning, exploitation, and password cracking. Whether you're a beginner looking to build foundational knowledge or an intermediate learner seeking to enhance your cybersecurity skill set, this course will equip you with the necessary skills to navigate the Linux environment and perform basic security assessments effectively.

What is Kali Linux?

Kali Linux is an open-source, Debian-based Linux distribution released in March of 2013, primarily created for advanced Penetration Testing and Security Auditing. It used to be known as BackTrack Linux Kali Linux contains hundreds of tools that perform various information security tasks, such as computer forensics, reverse engineering, security research, and penetration testing. It provides a multi-platform solution that is freely available and accessible to both professionals and hobbyists in the information technology industry.


What is Linux and why should I use it?

Linux is an operating system (OS), which is the primary software that a computer uses to execute tasks and communicate directions to its hardware The operating system that competes the most with Linux is Windows Linux is a popular and widely-used OS because it is open-source, meaning that it is free to the public, and anyone can modify and customize Linux software as they wish The reasons to use Linux can vary from developing an app or building a video game to learning how to hack computer systems As Linux is one of the most popular operating systems, many developers use it to develop their web applications and software programs This means knowledge of Linux is important for anyone working with computers and software in general Learning how to work with Linux is a necessary skill for anyone pursuing a career in ethical hacking or penetration testing

Why do hackers use Linux?

Both ethical (white hat) hackers and malicious (black hat) hackers often prefer to use the Linux operating system (OS) over Windows OS The biggest reason hackers turn to Linux is because it is far more accessible to a wider range of people than Windows OS offers Linux is free, open-source, and provides a well-integrated command-line interface for users to customize the OS This means anyone can modify Linux to create their own programs and software Malicious hackers often opt for Linux because it gives them more control when using Linux, and ethical hackers need to be well-versed in Linux because it’s so popular among black hat hackers Ethical hackers also often prefer using Linux as it has better existing security measures than Windows and doesn’t usually require third-party antivirus software

  • Step by Step, Simple and Easy with Exercises

  • Video and Audio Production Quality

  • All of our videos are processed/produced as high-quality video and audio to provide you the best learning experience

You'll be,

  • See clearly

  • Hear clearly

  • Proceed the course without getting distracted

Let's start the "Kali Linux Tutorial for Ethical Hacking & Penetration Test" course,
Mastering Kali Linux for Ethical Hackers and Penetration Testers with tools like Wireshark, NMAP, Metasploit, Burp Suite

We offer full support by answering any questions

See you in the course!

Who is this course for?

  • Anyone who think "what should be done to become a hacker"?
  • Anyone who want to learn the Kali Linux operating system.
  • Anyone who are planning to do a penetration test.
  • Adventure lovers who want to explore a new world.
  • Anyone looking for a new and updated interest.
  • People who want to learn linux, kali linux, ethical hacking

Requirements

  • No prior knowledge about kali linux required
  • Basic knowledge of computer use
  • Computer to install Linux or run it virtual.
  • Curiosity for Kali Linux
  • Desire to become and ethical hacker and willingness to learn Kali-Linux
  • Desire to learn Kali Linux and beginning of ethical hacking
  • Desire to learn NAMP and ethical hacking, penetration testing
  • Nothing else! It’s just you, your computer and your ambition to get started today for kali linux tutorial
  • A strong desire to understand kali linux and ethical hacking

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

Provider

Oak Academy

At OAK Academy, we are the tech experts who have been in the sector for years and years. We are deeply rooted in the tech world. As insiders we know the tech industry’s biggest problem is the “tech skills gap” and here is our solution.

OAK Academy will be the bridge between the tech industry and people who

-are planning a new career

-are thinking career transformation

-want career shift or reinvention,

-have the desire to learn new hobbies at their own pace

We help people of this generation gain the skill to fill these jobs and to enjoy a happier, and a more fulfilling career prospect. This is what motivates us every day.

We specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, amazon fba, web and mobile development technologies. Thanks to our practical alignment, we are able to constantly translate industry insights into the most in-demand and up-to-date courses.

OAK Academy will provide you the information and support you need to move through your new career journey, with confidence and ease.

Our courses are for everyone. Whether you are someone who has never programmed before, or an existing programmer seeking to learn another language, or even someone looking to switch careers we are here.

OAK Academy here to transforms passionate, enthusiastic people to reach their dream job positions.

If you need help or if you have any questions, please do not hesitate to contact our team.

View Oak Academy profile

FAQs

Interest free credit agreements provided by Zopa Bank Limited trading as DivideBuy are not regulated by the Financial Conduct Authority and do not fall under the jurisdiction of the Financial Ombudsman Service. Zopa Bank Limited trading as DivideBuy is authorised by the Prudential Regulation Authority and regulated by the Financial Conduct Authority and the Prudential Regulation Authority, and entered on the Financial Services Register (800542). Zopa Bank Limited (10627575) is incorporated in England & Wales and has its registered office at: 1st Floor, Cottons Centre, Tooley Street, London, SE1 2QG. VAT Number 281765280. DivideBuy's trading address is First Floor, Brunswick Court, Brunswick Street, Newcastle-under-Lyme, ST5 1HH. © Zopa Bank Limited 2025. All rights reserved.