Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn ethical hacking through Kali Linux, one of the leading computer security operating systems, and discover how to gather information, detect vulnerabilities, and exploit them using tools in Kali Linux.
This course will equip you with the necessary tools to test your own servers and applications for vulnerabilities. As computer security is one of the fastest-growing fields in technology and ethical hacking is a crucial skill, with new attacks occurring every 39 seconds, it is vital that security experts are equipped with the most powerful tools.
The tools in Kali Linux, commonly used by attackers and defenders, will help secure your systems before attackers do. You will learn to exploit common vulnerabilities in Linux and Windows and find common vulnerabilities in web apps like command injections and SQL injections.
Learn to set up Kali Linux, use the DNS toolkit, conduct network security scanning with Nmap, exploit web applications using popular tools, scan web servers, and use unix-privesc-checker to identify misconfiguration.
This course is ideal for computer users looking to expand their understanding of ethical hacking and computer security. This is an easy-to-follow course for beginners who want to get started with their journey in cybersecurity.