Enter the world of Red Teaming. Master reconnaissance, scanning, vulnerability assessment, and ethical exploitation using Kali Linux.
Ethical hacking requires a disciplined methodology. This course introduces the offensive security lifecycle. You will learn passive and active reconnaissance to gather intel, scan networks using Nmap for live hosts and services, and identify vulnerabilities. We cover the basics of exploitation using Metasploit and the importance of responsible reporting. Using Kali Linux, the industry-standard toolbox, you will gain hands-on experience with the tools used by both attackers and defenders.
Estimated completion time: 21 lessons • Self-paced learning • Lifetime access
We teach Ethical Hacking; permission is mandatory.
Aligned with CompTIA PenTest+ and CEH concepts.
A laptop capable of running a Kali VM.
Scripting (Python/Bash) is helpful but not required.