Course description

Kali Linux is the gold standard for information security professionals. This course moves beyond just "using a tool" to mastering the Debian-based architecture that powers the industry's most sophisticated security audits.

You will start by hardening your own Kali environment—learning the Linux filesystem, advanced command-line operations, and package management. From there, we dive into the Offensive Security mindset. You will explore the pre-installed arsenal of 600+ tools, including Nmap for reconnaissance, Metasploit for exploitation, and Aircrack-ng for wireless auditing. This course provides the hands-on experience needed to perform vulnerability assessments and understand the technical nuances of system exploitation and digital forensics.

What will i learn?

  • Master the Kali CLI: Confidently navigate the terminal, manage users, and automate tasks using Bash scripting.
  • Conduct Professional Reconnaissance: Use tools like Nmap, Maltego, and Recon-ng to map attack surfaces.
  • Perform Vulnerability Analysis: Identify system weaknesses using automated scanners and manual verification.
  • Execute Exploitations: Safely use the Metasploit Framework and custom exploits in a controlled lab environment.
  • Build a Lab Infrastructure: Setup and configure VirtualBox or VMware to run "vulnerable by design" targets.

Requirements

  • A computer with at least 8GB RAM (16GB recommended) and VT-x/AMD-V virtualization support.
  • Foundational knowledge of networking (IP addressing, ports, and protocols).
  • Familiarity with basic computer hardware concepts.
  • Ethical Agreement: Willingness to adhere to a strict code of ethics regarding the use of security tools.

Frequently asked question

No. While it is built for offensive security, it is an essential tool for System Administrators and Defensive Analysts who need to "think like a hacker" to better secure their own networks.

We generally discourage this for beginners. We will teach you how to run Kali as a Virtual Machine (VM) or a Live USB, which is safer and more efficient for learning.

Yes. This course serves as a comprehensive foundational "bridge" to the Offensive Security Certified Professional (OSCP) curriculum and the PEN-200 certification.

faramaye Ireoluwa Victor

₦150000

₦200000

Lectures

0

Skill level

Advanced

Expiry period

2 Months

Certificate

Yes

Share this course

Related courses