Kali Linux for Ethical Hackers
Master Kali Linux: Metasploit, Burp Suite, Nmap, Hydra, SET, SQLMap, John & More
4.51 (681 reviews)

53 744
students
5 hours
content
Jun 2025
last update
$19.99
regular price
What you will learn
Master Kali Linux fundamentals and essential terminal commands
Set up a hacking lab with virtual machines and real-world vulnerable targets
Perform advanced Linux command-line operations and system navigation
Install and use industry-standard tools like Metasploit, Burp Suite, Nmap, SQLMap, Hydra, John the Ripper, Zaproxy, and SEToolkit
Conduct penetration testing on Linux and Windows machines using Metasploit
Launch and analyze web attacks such as brute force, cookie tampering, HTTP verb tampering, and 2FA bypass with Burp Suite
Perform network scanning, host discovery, OS and service detection using Nmap
Explore Nmap Scripting Engine (NSE) for vulnerability detection
Crack passwords using John the Ripper with various modes and formats
Brute-force logins for SSH, FTP, and web apps using Hydra
Create and use wordlists for targeted brute-force attacks
Analyze and manipulate web requests with tools like Repeater, Decoder, and Intruder in Burp Suite
Automate and exploit SQL injection vulnerabilities using SQLMap
Dump databases, gain SQL shells, and bypass login forms with SQL injection
Test real-world web applications with DVWA (Damn Vulnerable Web Application)
Exploit all DVWA modules including brute force, command injection, CSRF, XSS, file upload, SQLi, and more
Explore and understand WiFi security protocols and hacking techniques
Perform social engineering attacks with SEToolkit
Recover deleted files and understand post-exploitation data recovery techniques
Gain hands-on experience with 80+ practical lectures and exercises
Learn how real attackers operate and how to defend against them
Loading charts...
5677236
udemy ID
25/11/2023
course created date
29/11/2023
course indexed date
Bot
course submited by