How to Use Kali Linux: Kali Linux for Beginners
Learn ethical hacking using Kali Linux through real-world attacks on networks, websites, and mobile devices. Set up a virtual lab, master hacking tools, and gain skills to perform penetration tests and write professional security reports.
What You’ll Learn
This How to Use Kali Linux: Kali Linux for Beginners will teach you:
- Wireless hacking: Crack WEP, WPA/WPA2, and WPS-secured networks.
- Lab setup and virtualization: Build your Kali Linux lab with target machines.
- Web exploitation: Use SQLMap and other tools to attack web apps.
- Social engineering: Execute phishing and data collection campaigns.
- Linux command-line basics: Navigate and operate Kali effectively.
- Password cracking: Perform brute force, rainbow table, and wordlist attacks.
- Post-exploitation: Maintain access and install backdoors on compromised systems.
- Network attacks: Scan, spoof, and exploit LAN vulnerabilities.
Included in the How to Use Kali Linux
Suitable for the Following Careers
Course Content
Training Overview
Chapter 1. Introduction
Chapter 2. Setup Your Lab
Chapter 3. Your Command and Control Server
Chapter 4. Steps to Plan a Successful Penetration Test
Chapter 5. 9+ Ways to Attack a Network
Chapter 6. Attack Modern Wireless Networks
Chapter 7. 4+ Ways to Attack a Web
Chapter 8. Simple Ways to Gain Access
Chapter 9. Proven Social Engineering Techniques
Chapter 10. Attack Mobile Phones
Chapter 11. Maintain Permanent Access
Chapter 12. Let’s Get Real !
Chapter 13. How to Prepare and Present Your Report
Chapter 14. Secret Sauce BONUS
OPEN FULL CURRICULUM
Requirements
Description of How to Use Kali Linux: Kali Linux for Beginners
This course introduces ethical hacking with Kali Linux through hands-on penetration testing. You’ll begin by setting up a virtual environment and progress through practical techniques to attack real systems and applications. Every concept is taught with live demonstrations and explained step by step.
You’ll explore Linux security, network and wireless attacks, social engineering, and mobile exploitation using Kali Linux as your primary operating system. The course walks you through the Kali Linux installation, introduces essential Kali Linux tools, and explains how to navigate the file system effectively. You’ll work with powerful pre-installed tools like Nmap, Metasploit, and SQLMap, and by the end, you’ll know how to maintain access, evade firewalls, and document your findings in professional reports.
- Build and configure a Kali Linux hacking lab with GRUB boot loader setup
- Launch LAN, wireless, and DNS spoofing attacks using built-in security tools
- Hack Android devices, reverse engineer apps, and uncover hidden files
- Exploit web vulnerabilities, access databases, and enhance penetration testing skills
- Crack passwords using multiple methods via the command line interface
- Create phishing attacks, gather intelligence, and analyze target systems
- Write clear, professional pentest reports backed by real-world testing data
By the end of the course, you'll have real-world skills in ethical hacking and penetration testing, including how to install Kali Linux as a virtual machine or on your main operating system. You'll understand the Kali Linux file system, use essential Kali tools, and even explore the Windows Subsystem for Linux (WSL) to run Kali on Windows.
Who Is This Course For
This course is for beginners looking to enter ethical hacking, offensive security, or cyber security roles. It’s also ideal for IT professionals and students who want hands-on experience with network scanning, password attacks, and performing various tasks on a target system using Kali Linux.
Course Instructor
Mohamad Mahjoub is a prolific writer, trainer, and cybersecurity expert with over 15 years of experience. He holds multiple certifications, including CISSP, ISO 27005 Risk Manager, ISO 27001 Lead Implementer, CISA, PMP, and ITIL. Mohamad earned his Master’s Degree in Computer Science from the Lebanese American University, graduating magna cum laude.
He began his career as an IT project manager for a multinational pharmaceutical company, then transitioned to a senior role in Information Security Audit in the banking sector. He later moved to Dubai to become an Information Security Manager at a smart university. Currently, Mohamad serves as the CISO for a French multinational company, overseeing IT and OT security operations throughout the Middle East.
Since 2012, Mohamad has delivered numerous IT courses to a diverse audience, including fresh graduates, IT professionals, senior executives, and business owners. His online multi-lingual Cyber Security courses have over 100,000 students enrolled worldwide. Mohamad's extensive knowledge and dedication make him a trusted expert in the field of Cyber Security.
Read More
Read Less
Testimonials
Abid H.
Thanks for this effective course—it sparked my curiosity to dive deeper into penetration testing. The practical examples, use of both command line and graphical interface, and clear breakdown of pentesting tools and key features made learning smooth and engaging.
Rex L.
It is a fast-paced course. The course introduces a lot of tools and gives overview in various aspects. It would be better to have a short pause between commands and screens.
Julian I.
It was a great learning experience, The instructor was well knowleged in the field of ethical hacking, since I was not a beginner who enrolled in this course, but the course content is helpful for both beginners and advanced.
Show More
Show Less