IBM
Ethical Hacking with Kali Linux
IBM

Ethical Hacking with Kali Linux

IBM Skills Network Team
Dee Dee Collette

位教师:IBM Skills Network Team

4,307 人已注册

包含在 Coursera Plus

深入了解一个主题并学习基础知识。
4.8

(33 条评论)

中级 等级

推荐体验

2 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
4.8

(33 条评论)

中级 等级

推荐体验

2 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度

您将学到什么

  • Job-ready skills to effectively use Kali Linux security and penetration testing tools for ethical hacking in just 5 weeks

  • Perform penetration tests using Kali Linux, applying various tools and techniques to assess vulnerabilities in controlled environments

  • Configure virtual machines and customize Kali Linux security tools to create safe, efficient, and adaptable testing environments

  • Automate maintenance, security, and penetration tasks using command-line tools and scripting to optimize system performance and security

要了解的详细信息

可分享的证书

添加到您的领英档案

最近已更新!

May 2025

作业

12 项作业

授课语言:英语(English)

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

积累 Security 领域的专业知识

本课程是 IBM Ethical Hacking with Open Source Tools 专业证书 专项课程的一部分
在注册此课程时,您还会同时注册此专业证书。
  • 向行业专家学习新概念
  • 获得对主题或工具的基础理解
  • 通过实践项目培养工作相关技能
  • 通过 IBM 获得可共享的职业证书

该课程共有5个模块

This module will kickstart your cybersecurity journey by helping you master the essentials of Kali Linux, the go-to platform for penetration testing. In this module, you’ll explore its architecture, install and configure Kali Linux in a virtualized environment, and learn best practices for optimizing your setup. Dive into securing your system by hardening Kali Linux, protecting your home lab, and utilizing built-in tools for system protection. Through hands-on activities and optional labs, you’ll gain practical experience in installation, configuration, and security. Finally, you’ll have a secure, fully functional Kali Linux environment ready for advanced tasks.

涵盖的内容

6个视频6篇阅读材料3个作业7个插件

In this module, you’ll dive deep into the powerful cybersecurity tools included in Kali Linux, gaining hands-on experience in investigation, exploitation, and penetration testing. You’ll explore tools for information gathering, forensics, and vulnerability analysis, enabling you to identify and assess security risks effectively. Additionally, you’ll learn to use exploitation tools, perform sniffing and spoofing attacks, and discover the capabilities of Kali NetHunter for mobile penetration testing. Through hands-on activities, you’ll practice using these tools in real-world scenarios, including optional labs for advanced exploration. By the end of this module, you’ll have the skills to investigate vulnerabilities, exploit security weaknesses, and leverage Kali Linux’s tools to strengthen your cybersecurity expertise.

涵盖的内容

6个视频2篇阅读材料3个作业8个插件

In this module, you’ll unlock the full potential of Kali Linux by learning to automate tasks and customize tools using scripting. You’ll start with the basics of Python and Bash, two powerful scripting languages, and gain hands-on experience writing scripts to automate maintenance and security tasks. You’ll also learn to write basic scripts, automate security workflows, and modify existing Kali Linux tools to suit your needs. By the end of this module, you’ll be able to create Python scripts for security automation, write Bash scripts for system maintenance, and customize Kali Linux tools to enhance their functionality. These skills will empower you to streamline your workflows and tackle complex cybersecurity challenges with efficiency and precision.

涵盖的内容

6个视频2篇阅读材料3个作业4个应用程序项目8个插件

In this module, you’ll apply your knowledge and hands-on skills from the course by completing a final project. You’ll tackle real-world tasks, including planning, developing, and testing a custom script to automate a common cybersecurity or maintenance task. This project will challenge you to integrate scripting, tool customization, and automation techniques you’ve learned, showcasing your ability to solve practical problems efficiently. By the end, you’ll have a functional script and a deeper understanding of how automation can streamline workflows in cybersecurity and ethical hacking.

涵盖的内容

2个视频2篇阅读材料1个作业2个应用程序项目1个插件

This module introduces you to the Linux operating system, a cornerstone of cybersecurity and ethical hacking. You’ll explore the architecture of Linux, understand the differences between popular distributions, and gain hands-on experience with the Linux Terminal. Learn essential commands for navigating files and directories, managing system information, and configuring access controls. Through interactive labs, you’ll practice browsing directories, managing file permissions, and implementing access controls, building a strong foundation for working in Linux environments. By the end of this module, you’ll be proficient in using the Linux Terminal and managing system resources effectively.

涵盖的内容

5个视频3篇阅读材料2个作业3个应用程序项目6个插件

获得职业证书

将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。

位教师

授课教师评分
4.7 (7个评价)
IBM Skills Network Team
IBM
83 门课程1,540,397 名学生
Dee Dee Collette
IBM
10 门课程633,479 名学生

提供方

IBM

从 Security 浏览更多内容

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.
自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'
Jennifer J.
自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'
Larry W.
自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'
Chaitanya A.
''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'

学生评论

4.8

33 条评论

  • 5 stars

    87.87%

  • 4 stars

    9.09%

  • 3 stars

    0%

  • 2 stars

    0%

  • 1 star

    3.03%

显示 3/33 个

KC
5

已于 Jul 10, 2025审阅

Coursera Plus

通过 Coursera Plus 开启新生涯

无限制访问 10,000+ 世界一流的课程、实践项目和就业就绪证书课程 - 所有这些都包含在您的订阅中

通过在线学位推动您的职业生涯

获取世界一流大学的学位 - 100% 在线

加入超过 3400 家选择 Coursera for Business 的全球公司

提升员工的技能,使其在数字经济中脱颖而出

常见问题