• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Kali Linux

    Kali Linux Courses Online

    Learn Kali Linux for penetration testing and security auditing. Understand how to use its tools for ethical hacking and vulnerability assessment.

    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Build job-relevant skills in under 2 hours with hands-on tutorials.
    Learn from top instructors with graded assignments, videos, and discussion forums.
    Learn a new tool or skill in an interactive, hands-on environment.
    Get in-depth knowledge of a subject by completing a series of courses and projects.
    Earn career credentials from industry leaders that demonstrate your expertise.

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Explore the Kali Linux Course Catalog

    • C

      Coursera Project Network

      Create C# App Inheritance, Composition, and Aggregation

      Skills you'll gain: Object Oriented Programming (OOP), C# (Programming Language), Object Oriented Design, Application Development, Data Structures

      4.9
      Rating, 4.9 out of 5 stars
      ·
      8 reviews

      Intermediate · Guided Project · Less Than 2 Hours

    • E

      Edureka

      Go Programming Language

      Skills you'll gain: Restful API, Cloud-Native Computing, Go (Programming Language), Cloud Applications, API Design, Kubernetes, Microservices, Web Services, Application Programming Interface (API), Containerization, Application Deployment, Docker (Software), Distributed Computing, Software Design Patterns, Programming Principles, Package and Software Management, System Programming, Performance Tuning, Web Development, Debugging

      2.9
      Rating, 2.9 out of 5 stars
      ·
      28 reviews

      Intermediate · Specialization · 3 - 6 Months

    • C

      Coursera Project Network

      تعلّم أساسيات نظام التشغيل لينكس

      Skills you'll gain: Linux, File Management, Linux Commands, User Accounts, Linux Administration, Command-Line Interface, File Systems, Unix Commands

      4.8
      Rating, 4.8 out of 5 stars
      ·
      9 reviews

      Beginner · Guided Project · Less Than 2 Hours

    • D

      Duke University

      Building Rust AWS Lambda Microservices with Cargo Lambda

      Skills you'll gain: Serverless Computing, Amazon Web Services, Rust (Programming Language), Debugging, Application Deployment, Development Environment

      Beginner · Guided Project · Less Than 2 Hours

    • Status: New
      New
      C

      Coursera Project Network

      Implementing CI/CD with Jenkins: Creating Pipeline as Code

      Skills you'll gain: Jenkins, CI/CD, Continuous Integration, DevOps, Application Deployment, Devops Tools, Continuous Delivery, Spring Framework, Software Configuration Management, Build Tools, Version Control

      Intermediate · Guided Project · Less Than 2 Hours

    • G

      Google Cloud

      Orchestrating the Cloud with Kubernetes

      Skills you'll gain: Kubernetes, Docker (Software), Microservices, Containerization, Application Deployment, Google Cloud Platform, Cloud Management, Service Management

      4.3
      Rating, 4.3 out of 5 stars
      ·
      9 reviews

      Beginner · Project · Less Than 2 Hours

    • P

      Packt

      Nessus Scanner - Network Scanning from Beginner to Advanced

      Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment, Penetration Testing, Network Security, Network Monitoring, Software Installation, System Configuration, Cyber Security Policies, Microsoft Windows, Linux, Payment Card Industry (PCI) Data Security Standards, Integration Testing

      Beginner · Course · 1 - 3 Months

    • P

      Packt

      Certified Kubernetes Security Specialist (CKS) Course

      Skills you'll gain: Kubernetes, Hardening, Role-Based Access Control (RBAC), DevSecOps, Application Security, Infrastructure Security, Cloud Security, Containerization, Microservices, Network Security, Docker (Software), Secure Coding, Identity and Access Management, Threat Detection, Encryption

      Advanced · Course · 3 - 6 Months

    • I

      Illinois Tech

      Cloud Computing Technologies - Master's

      Skills you'll gain: Cloud-Native Computing, Cloud Computing, Amazon Web Services, Infrastructure as Code (IaC), Cloud Computing Architecture, Cloud Storage, Cloud Infrastructure, Amazon S3, Scalability, Terraform, Infrastructure As A Service (IaaS), Database Management, Command-Line Interface, Virtualization

      Build toward a degree

      Intermediate · Course · 1 - 3 Months

    • Status: New
      New
      I

      IBM

      Cloud Native, Microservices, Containers, DevOps and Agile

      Skills you'll gain: Cloud-Native Computing, Docker (Software), Containerization, Microservices, Agile Methodology, DevOps, Agile Software Development, Kubernetes, CI/CD, Cloud Development, Agile Project Management, Hybrid Cloud Computing, Scrum (Software Development), Restful API, Continuous Delivery, Cloud Applications, Software Development Methodologies, Continuous Integration, Cloud Infrastructure, Postman API Platform

      4.7
      Rating, 4.7 out of 5 stars
      ·
      7 reviews

      Beginner · Course · 1 - 3 Months

    • G

      Google Cloud

      Developing Containerized Applications on Google Cloud

      Skills you'll gain: Containerization, Docker (Software), CI/CD, Kubernetes, Cloud Development, Cloud Applications, Application Deployment, Secure Coding, Google Cloud Platform, Infrastructure Security

      4.4
      Rating, 4.4 out of 5 stars
      ·
      8 reviews

      Beginner · Course · 1 - 4 Weeks

    • P

      Packt

      REST APIs with Flask and Python in 2024

      Skills you'll gain: Git (Version Control System), Application Deployment, Restful API, Docker (Software), Database Management, Flask (Web Framework), Software Versioning, Object-Relational Mapping, Application Programming Interface (API), JSON, Authentications, Web Development, Programming Principles, Python Programming, Back-End Web Development, Object Oriented Programming (OOP), Secure Coding, Data Structures

      4.4
      Rating, 4.4 out of 5 stars
      ·
      10 reviews

      Intermediate · Course · 1 - 3 Months

    Kali Linux learners also search

    Mobile Design
    Mobile Web
    Mobile App Development
    Beginner Mobile App Development
    App Development
    Android Programming
    Android
    Android Design
    1…282930…41

    In summary, here are 10 of our most popular kali linux courses

    • Create C# App Inheritance, Composition, and Aggregation: Coursera Project Network
    • Go Programming Language: Edureka
    • تعلّم أساسيات نظام التشغيل لينكس: Coursera Project Network
    • Building Rust AWS Lambda Microservices with Cargo Lambda: Duke University
    • Implementing CI/CD with Jenkins: Creating Pipeline as Code: Coursera Project Network
    • Orchestrating the Cloud with Kubernetes: Google Cloud
    • Nessus Scanner - Network Scanning from Beginner to Advanced: Packt
    • Certified Kubernetes Security Specialist (CKS) Course: Packt
    • Cloud Computing Technologies - Master's: Illinois Tech
    • Cloud Native, Microservices, Containers, DevOps and Agile: IBM

    Skills you can learn in Computer Security And Networks

    Cybersecurity (33)
    Google (25)
    Google Cloud Platform (17)
    Internet (17)
    Cryptography (16)
    Network Security (16)
    Linux (12)
    Software Testing (12)
    Information Security (10)
    Application Programming Interfaces (8)
    Kubernetes (8)
    Web (8)

    Frequently Asked Questions about Kali Linux

    Kali Linux is an open-source operating system primarily used for penetration testing and digital forensics. It provides a wide range of tools and applications that assist in identifying security vulnerabilities and testing the security of computer systems. Developed by Offensive Security, Kali Linux is widely used by cybersecurity professionals and ethical hackers for various purposes, including network reconnaissance, vulnerability scanning, password cracking, and more. It is known for its extensive collection of pre-installed software packages and continuous updates to ensure the latest tools are available for cybersecurity researchers and professionals.‎

    To effectively use Kali Linux, you should consider mastering the following skills:

    1. Linux Command Line: Familiarize yourself with basic Linux commands and understand how the command line interface works. This will be crucial for navigating and interacting with Kali Linux effectively.

    2. Networking and TCP/IP: Gain understanding of network protocols, including TCP/IP, IP addressing, subnetting, and how they function. This knowledge will help you utilize Kali Linux's powerful networking tools.

    3. Ethical Hacking: As Kali Linux is primarily used for security testing and penetration testing, having a solid foundation in ethical hacking is essential. Learn about common vulnerabilities, security testing methodologies, and tools used for penetration testing.

    4. Web Application Security: Focus on web application security concepts like OWASP top 10 vulnerabilities, SQL injection, cross-site scripting (XSS), and other common web-based exploits. Kali Linux offers various tools specifically designed for web application security testing.

    5. Wireless Network Security: Since Kali Linux supports wireless penetration testing, understanding wireless security concepts such as encryption protocols, Wi-Fi hacking techniques, and tools such as Aircrack-ng will be beneficial.

    6. Password Cracking: Learn about different password cracking techniques, such as brute-forcing, dictionary attacks, and rainbow tables. Familiarize yourself with tools like John the Ripper, Hashcat, and Hydra, which are commonly used in Kali Linux for this purpose.

    7. Vulnerability Assessment: Acquire knowledge about various vulnerability assessment techniques, including scanning networks and systems for vulnerabilities, analyzing results, and suggesting mitigation strategies. Tools like OpenVAS and Nessus are popular choices for vulnerability assessment.

    Remember, as Kali Linux is a powerful tool with significant implications, ethical usage and adherence to legal boundaries are crucial. Always ensure you use it responsibly and obtain proper authorization when performing security testing on systems and networks.‎

    With Kali Linux skills, you can pursue various rewarding job opportunities. Some of the jobs that align with Kali Linux skills include:

    1. Ethical Hacker/Penetration Tester: Kali Linux is a preferred operating system for ethical hackers and penetration testers who identify vulnerabilities in networks and systems to enhance their security.

    2. Cybersecurity Analyst: Kali Linux skills are highly sought after in the field of cybersecurity. As a cybersecurity analyst, you would use Kali Linux to assess and defend against cyber threats, conduct security audits, and implement protective measures.

    3. Security Consultant: With Kali Linux expertise, you can work as a security consultant, advising organizations on strengthening their security infrastructure, performing risk assessments, and developing incident response plans.

    4. Network Security Engineer: In this role, you would utilize Kali Linux skills to design and implement secure network architectures, configure firewalls, monitor network traffic, and respond to security incidents.

    5. Digital Forensics Investigator: Kali Linux skills are valuable for digital forensics professionals who investigate cybercrimes, analyze digital evidence, and recover compromised systems.

    6. SOC Analyst: Security Operations Center (SOC) analysts use Kali Linux tools to monitor and respond to security incidents, detect and mitigate threats, and maintain network and system security.

    7. Incident Responder: Kali Linux proficiency can lead you to a career as an incident responder. You would analyze security breaches, identify root causes, develop remediation plans, and implement preventive measures.

    8. Cybersecurity Consultant: As a cybersecurity consultant, you would assist clients with risk assessments, policy development, vulnerability assessments, and security strategy formulation, leveraging your Kali Linux knowledge.

    Remember, Kali Linux skills coupled with relevant certifications and experience significantly enhance your prospects for these roles.‎

    People who are best suited for studying Kali Linux are those who have a strong interest in cybersecurity and ethical hacking. They should have a basic understanding of computer systems, networking, and operating systems. Additionally, individuals who possess problem-solving skills, attention to detail, and a willingness to continuously learn and adapt to new technologies will excel in studying Kali Linux.‎

    There are several topics that you can study that are related to Kali Linux. Here are a few suggestions:

    1. Ethical Hacking: Kali Linux is widely used for ethical hacking purposes. You can study topics such as network scanning, vulnerability assessment, and penetration testing using Kali Linux.

    2. Cybersecurity: Kali Linux has numerous tools that are specifically designed for cybersecurity professionals. You can study topics like secure network communication, information security, and digital forensics using Kali Linux.

    3. Linux System Administration: Kali Linux is built on the Debian distribution of Linux and studying topics related to Linux system administration will enhance your understanding of Kali Linux. You can learn about package management, command-line tools, and Linux server administration.

    4. Wireless Network Security: Kali Linux provides tools for wireless network penetration testing and securing Wi-Fi networks. You can study topics like wireless encryption, network sniffing, and securing wireless networks using Kali Linux.

    5. Web Application Security: Kali Linux offers tools for testing the security of web applications. You can study topics such as web application vulnerabilities, SQL injection, cross-site scripting, and web application firewall testing using Kali Linux.

    6. Digital Privacy: Kali Linux includes tools for protecting your digital privacy and enhancing online anonymity. You can study topics like Tor network, VPN setup, encryption methods, and securing personal data using Kali Linux.

    These topics will help you gain a deep understanding of Kali Linux and its applications in various domains.‎

    Online Kali Linux courses offer a convenient and flexible way to enhance your knowledge or learn new Kali Linux is an open-source operating system primarily used for penetration testing and digital forensics. It provides a wide range of tools and applications that assist in identifying security vulnerabilities and testing the security of computer systems. Developed by Offensive Security, Kali Linux is widely used by cybersecurity professionals and ethical hackers for various purposes, including network reconnaissance, vulnerability scanning, password cracking, and more. It is known for its extensive collection of pre-installed software packages and continuous updates to ensure the latest tools are available for cybersecurity researchers and professionals. skills. Choose from a wide range of Kali Linux courses offered by top universities and industry leaders tailored to various skill levels.‎

    When looking to enhance your workforce's skills in Kali Linux, it's crucial to select a course that aligns with their current abilities and learning objectives. Our Skills Dashboard is an invaluable tool for identifying skill gaps and choosing the most appropriate course for effective upskilling. For a comprehensive understanding of how our courses can benefit your employees, explore the enterprise solutions we offer. Discover more about our tailored programs at Coursera for Business here.‎

    This FAQ content has been made available for informational purposes only. Learners are advised to conduct additional research to ensure that courses and other credentials pursued meet their personal, professional, and financial goals.

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog
    • Teaching Center

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok