Ethical Hacking and Penetration Testing Using Kali Linux

4.6 ( 2 REVIEWS )
3 STUDENTS

Course Overview

Ethical Hacking and Penetration Testing Using Kali Linux is a practical, lab-focused course designed to teach you real-world penetration testing techniques from reconnaissance to exploitation. You will build your own virtual hacking lab, learn to remain anonymous online, and perform structured security testing using professional tools.

The course covers passive reconnaissance, vulnerability scanning with Nmap, Nessus, and OpenVAS, exploitation of Windows and Linux systems, web application attacks, password cracking, and social engineering concepts. You will also complete Capture the Flag walkthroughs and explore digital forensics case management. By the end, you will understand the full penetration testing lifecycle and how to conduct ethical security assessments responsibly.

Duration: 19 hours, 44 minutes | Level: Intermediate | Language: English

What You'll Learn

Exclusive Offer

What You'll Get

Frequently Asked Questions

 A: Yes. It starts with lab setup and foundational concepts before advanced exploitation.

 

A: Yes. The course includes practical labs and Capture the Flag walkthroughs.

 

 A: Yes. Nmap, Nessus, and OpenVAS are included.

 

 

 A: Yes. A bonus section covers forensic case management.

 

Course Curriculum

Course Overview
Course Overview 00:04:00
Building Your Virtual Lab Environment
Lab-Creating a Virtual install of Kali using VirtualBox 00:13:00
Installing the VirtualBox Extension Pack 00:02:00
Lab-Creating a Virtual Install of CSI Linux 00:13:00
Lab-Creating an Unattended Virtual Install of XP Using Virtualbox 00:08:00
Taking a Snapshot of Your Current configuration 00:04:00
Anonymity - Remaining Anonymous While Browsing Online
Lab-Anonymize Kali Using Whonix 00:10:00
Lab-Ensuring Anonymity Using the CSI Linux Gateway 00:13:00
Assigning a Random MAC Address in Kali 00:07:00
Passive reconnaissance
Lab-Information Gathering Using Maltego 00:10:00
Lab-Conducting OSINT Using CSI Linux Investigator 00:08:00
Using Metagoofil inside CSI Linux Analyst 00:05:00
Conducting a Passive Reconnaissance Using Shodan
Lab-Preparing CSI Analyst to Use Shodan 00:06:00
Lab-Using Shodan to Find Vulnerable Devices 00:16:00
Lab-Using Shodan to Search for Vulnerable Databases 00:08:00
NMap
Lab-Introduction to NMap 00:17:00
Lab-NMap Scripting Engine (NSE) 00:19:00
Lab-Scanning for WannaCry Ransomware 00:14:00
Scanning for Vulnerabilities Using NESSUS
Lab-Installing NESSUS Using Docker 00:15:00
Lab-Scanning for Vulnerabilities Using Nessus 00:11:00
Using Your Nessus Scan Results 00:12:00
Scanning for Vulnerabilities Using OpenVAS
Lab-Installing OpenVAS Using Docker 00:09:00
Lab – Scanning for Vulnerabilities Using OpenVAS 00:10:00
Exploiting Windows XP
Video and Lab- Using Metasploit to Launch a DOS Attack Against Windows XP 00:09:00
Lab-Establishing A VNC Shell Using Meterpreter 00:18:00
Lab-Using Meterpreter to backdoor Windows XP 00:12:00
Lab – Exploiting Vulnerable Applications on Windows XP SP2 01:15:00
Lab – Hacking Windows XP via MS11-006 Windows Shell Graphics Processing 01:05:00
NetCat
Creating a Virtual Install of Server 2008 Using virtualBox 00:07:00
Lab-Create Reverse Shell Using MS09_050 00:12:00
Exploiting Linux
Lab-Installing Metasploitable2 Using VirtualBox 00:10:00
Lab – Learning to Hack Linux Using Metasploitable2 01:10:00
Lab – Exploring Endpoint Attacks 01:35:00
Social Engineering
Lab-Using the Social Engineering Toolkit (SET) 00:07:00
BASH Scripting for Pentesters
Lab-Introduction to BASH Scripting 00:08:00
Lab-Creating a BASH Script for Linux Fedora Part-1 00:11:00
Lab-Creating a BASH Script for Linux Fedora Part-2 00:30:00
Password Cracking
Lab – Password Cracking Using Medusa 00:06:00
Lab-Passwords Cracking Using Mimikatz 00:11:00
Lab-Password Cracking Using Hydra 00:05:00
Web Based Application Attacks
Lab-Installing w3af in Kali Linux Using Docker 00:13:00
Lab – Conducting A Website Vulnerability Scan Using w3af 00:05:00
Lab – Performing a Browser Based Attack 00:12:00
Lab-SQL Injection Attack Using SQLmap 00:12:00
Browser Exploitation Framework (BeEF)
Configure Kali for Exploitation the WAN 00:16:00
Lab-The Browser Exploitation Framework (BeEF) 00:19:00
Capture the Flag Walkthrough - Mr. Robot
Lab file – Capture the Flag (CTF) – Mr. Robot 02:25:00
Video Walk Through -Key #1 00:13:00
Video Walk through – Key #2 00:19:00
Video Walk Through – Key #3 00:08:00
Capture the Flag Walkthrough – Stapler
Lab File – Walkthrough – CTF – Stapler 02:40:00
Capture the Flag – Stapler Part 1 00:18:00
Capture the Flag – Stapler Part 2 00:17:00
Capture the Flag – Stapler Part 3 00:17:00
Bonus - Digital Forensics Case Management
Attaching an External USB Device in Kali 00:07:00
Lab -Digital Forensics Using Autopsy Part I 00:11:00
Lab-Digital Forensics Using Autopsy Part II 00:07:00
Assignment
Assignment – Ethical Hacking and Penetration Testing Using Kali Linux 00:00:00

Certificate of Achievement

Upon completion, you will receive a CPD-accredited certificate recognised globally. Choose from:

Pdf Certificate & Transcript  £7.99
Hardcopy Certificate & Transcript  £17.99

This certification validates your knowledge and skills, boosting your employability in healthcare.

Course Reviews

  • 5 stars 0
  • 4 stars 0
  • 3 stars 0
  • 2 stars 0
  • 1 stars 0

N.A

0
0 ratings

No Reviews found for this course.

Thames-college-logo-white-2021

We are a business that specialises in providing CPD & QLS accredited courses for anyone looking to advance their professional career.

Address : 78 Ilford Lane, Ilford, England, IG1 2LA

Email : info@thamescollege.org

Phone Number : ​020 8124 5465

Payment Methods

lead-payment-logos

Copyright © 2026 Thames College. All Right Reserved.

top