• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Kali Linux

    Kali Linux Courses Online

    Learn Kali Linux for penetration testing and security auditing. Understand how to use its tools for ethical hacking and vulnerability assessment.

    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Build job-relevant skills in under 2 hours with hands-on tutorials.
    Learn from top instructors with graded assignments, videos, and discussion forums.
    Learn a new tool or skill in an interactive, hands-on environment.
    Get in-depth knowledge of a subject by completing a series of courses and projects.
    Earn career credentials from industry leaders that demonstrate your expertise.

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Explore the Kali Linux Course Catalog

    • I

      Illinois Tech

      Hardware and Operating System Foundations II

      Skills you'll gain: Linux, Linux Administration, Linux Commands, User Accounts, Command-Line Interface, Systems Administration, Operating Systems, Service Management, System Configuration, Package and Software Management, System Monitoring, Graphical Tools, Software Installation, File Management

      Build toward a degree

      4.6
      Rating, 4.6 out of 5 stars
      ·
      57 reviews

      Intermediate · Course · 1 - 4 Weeks

    • C

      Coursera Project Network

      Getting Started with Linux Terminal

      Skills you'll gain: Linux Commands, Linux, Unix Commands, Command-Line Interface, File Management, System Configuration, Linux Administration, Package and Software Management

      4.6
      Rating, 4.6 out of 5 stars
      ·
      146 reviews

      Beginner · Guided Project · Less Than 2 Hours

    • P

      Packt

      An Introduction to Ethical Hacking with Kali Linux

      Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Network Security, Unix, Cybersecurity, Application Security, Linux, Web Applications, Infrastructure Security, Cyber Attacks, Network Analysis, Command-Line Interface, Virtual Machines, Web Servers

      Beginner · Course · 1 - 4 Weeks

    • G

      Google

      Operating Systems and You: Becoming a Power User

      Skills you'll gain: Package and Software Management, File Systems, Microsoft Windows, Desktop Support, Linux, Operating Systems, OS Process Management, Linux Administration, Remote Access Systems, System Monitoring, Command-Line Interface, User Accounts, Systems Administration, Technical Support and Services, File Management, Linux Commands, Software Installation, Identity and Access Management, Authorization (Computing), Virtualization

      4.7
      Rating, 4.7 out of 5 stars
      ·
      29K reviews

      Beginner · Course · 1 - 3 Months

    • U

      University of Colorado System

      Hacking and Patching

      Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation

      4
      Rating, 4 out of 5 stars
      ·
      275 reviews

      Intermediate · Course · 1 - 4 Weeks

    • P

      Packt

      Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux

      Skills you'll gain: Penetration Testing, Network Security, Wireless Networks, Local Area Networks, General Networking, Network Administration, Cybersecurity, Vulnerability Assessments, System Configuration, Linux Administration, Encryption, Network Analysis, Software Installation, Command-Line Interface, Virtual Machines

      Intermediate · Course · 1 - 3 Months

    • P

      Packt

      Getting Started in Port Scanning Using Nmap and Kali Linux

      Skills you'll gain: Ansible, Vulnerability Scanning, Network Security, Penetration Testing, Cybersecurity, Network Monitoring, Firewall, Linux Commands, System Configuration, Command-Line Interface, TCP/IP, Network Analysis, Configuration Management, Software Versioning

      Intermediate · Course · 1 - 4 Weeks

    • L

      LearnQuest

      Securing Linux Systems

      Skills you'll gain: Virtual Private Networks (VPN), Linux Administration, Public Key Infrastructure, Linux, Intrusion Detection and Prevention, Firewall, Remote Access Systems, Authentications, Authorization (Computing), Network Security, Security Controls, System Monitoring, File Management, Systems Administration, User Accounts, Encryption

      4.5
      Rating, 4.5 out of 5 stars
      ·
      110 reviews

      Beginner · Course · 1 - 4 Weeks

    • C

      Coursera Project Network

      Metasploit for Beginners: Ethical Penetration Testing

      Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Cybersecurity, Command-Line Interface, Virtual Machines, Technical Communication

      4.8
      Rating, 4.8 out of 5 stars
      ·
      54 reviews

      Beginner · Guided Project · Less Than 2 Hours

    • P

      Packt

      Ethical Hacking Foundations

      Skills you'll gain: Linux Commands, Linux, Command-Line Interface, Penetration Testing, Cyber Security Assessment, General Networking, Network Security, Cybersecurity, Vulnerability Assessments, Data Ethics, Computer Security Awareness Training, System Configuration, Software Installation, Virtual Machines, File Management

      4
      Rating, 4 out of 5 stars
      ·
      21 reviews

      Beginner · Course · 1 - 3 Months

    • P

      Packt

      Digital Forensics for Pentesters - Hands-On Learning

      Skills you'll gain: Penetration Testing, Network Protocols, Network Monitoring, Network Security, Network Analysis, Cyber Operations, Malware Protection, Cyber Security Assessment, Cyber Threat Intelligence, Threat Detection, Security Testing, System Configuration, Image Analysis, File Management, Open Source Technology, Virtualization, Virtual Machines, Software Installation, Microsoft Windows

      4.5
      Rating, 4.5 out of 5 stars
      ·
      11 reviews

      Intermediate · Course · 1 - 3 Months

    • A

      Akamai Technologies, Inc.

      Operating Systems Fundamentals

      Skills you'll gain: Linux, Linux Administration, File Systems, Linux Commands, Operating Systems, User Accounts, OS Process Management, Unix Shell, System Configuration, Command-Line Interface, Open Source Technology, Security Controls, Virtualization, Virtual Machines

      4.8
      Rating, 4.8 out of 5 stars
      ·
      106 reviews

      Beginner · Course · 1 - 3 Months

    Kali Linux learners also search

    Mobile Design
    Mobile Web
    Mobile App Development
    Beginner Mobile App Development
    App Development
    Android Programming
    Android
    Android Design
    1234…41

    In summary, here are 10 of our most popular kali linux courses

    • Hardware and Operating System Foundations II: Illinois Tech
    • Getting Started with Linux Terminal: Coursera Project Network
    • An Introduction to Ethical Hacking with Kali Linux: Packt
    • Operating Systems and You: Becoming a Power User: Google
    • Hacking and Patching: University of Colorado System
    • Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux: Packt
    • Getting Started in Port Scanning Using Nmap and Kali Linux: Packt
    • Securing Linux Systems: LearnQuest
    • Metasploit for Beginners: Ethical Penetration Testing: Coursera Project Network
    • Ethical Hacking Foundations: Packt

    Skills you can learn in Computer Security And Networks

    Cybersecurity (33)
    Google (25)
    Google Cloud Platform (17)
    Internet (17)
    Cryptography (16)
    Network Security (16)
    Linux (12)
    Software Testing (12)
    Information Security (10)
    Application Programming Interfaces (8)
    Kubernetes (8)
    Web (8)

    Frequently Asked Questions about Kali Linux

    Kali Linux is an open-source operating system primarily used for penetration testing and digital forensics. It provides a wide range of tools and applications that assist in identifying security vulnerabilities and testing the security of computer systems. Developed by Offensive Security, Kali Linux is widely used by cybersecurity professionals and ethical hackers for various purposes, including network reconnaissance, vulnerability scanning, password cracking, and more. It is known for its extensive collection of pre-installed software packages and continuous updates to ensure the latest tools are available for cybersecurity researchers and professionals.‎

    To effectively use Kali Linux, you should consider mastering the following skills:

    1. Linux Command Line: Familiarize yourself with basic Linux commands and understand how the command line interface works. This will be crucial for navigating and interacting with Kali Linux effectively.

    2. Networking and TCP/IP: Gain understanding of network protocols, including TCP/IP, IP addressing, subnetting, and how they function. This knowledge will help you utilize Kali Linux's powerful networking tools.

    3. Ethical Hacking: As Kali Linux is primarily used for security testing and penetration testing, having a solid foundation in ethical hacking is essential. Learn about common vulnerabilities, security testing methodologies, and tools used for penetration testing.

    4. Web Application Security: Focus on web application security concepts like OWASP top 10 vulnerabilities, SQL injection, cross-site scripting (XSS), and other common web-based exploits. Kali Linux offers various tools specifically designed for web application security testing.

    5. Wireless Network Security: Since Kali Linux supports wireless penetration testing, understanding wireless security concepts such as encryption protocols, Wi-Fi hacking techniques, and tools such as Aircrack-ng will be beneficial.

    6. Password Cracking: Learn about different password cracking techniques, such as brute-forcing, dictionary attacks, and rainbow tables. Familiarize yourself with tools like John the Ripper, Hashcat, and Hydra, which are commonly used in Kali Linux for this purpose.

    7. Vulnerability Assessment: Acquire knowledge about various vulnerability assessment techniques, including scanning networks and systems for vulnerabilities, analyzing results, and suggesting mitigation strategies. Tools like OpenVAS and Nessus are popular choices for vulnerability assessment.

    Remember, as Kali Linux is a powerful tool with significant implications, ethical usage and adherence to legal boundaries are crucial. Always ensure you use it responsibly and obtain proper authorization when performing security testing on systems and networks.‎

    With Kali Linux skills, you can pursue various rewarding job opportunities. Some of the jobs that align with Kali Linux skills include:

    1. Ethical Hacker/Penetration Tester: Kali Linux is a preferred operating system for ethical hackers and penetration testers who identify vulnerabilities in networks and systems to enhance their security.

    2. Cybersecurity Analyst: Kali Linux skills are highly sought after in the field of cybersecurity. As a cybersecurity analyst, you would use Kali Linux to assess and defend against cyber threats, conduct security audits, and implement protective measures.

    3. Security Consultant: With Kali Linux expertise, you can work as a security consultant, advising organizations on strengthening their security infrastructure, performing risk assessments, and developing incident response plans.

    4. Network Security Engineer: In this role, you would utilize Kali Linux skills to design and implement secure network architectures, configure firewalls, monitor network traffic, and respond to security incidents.

    5. Digital Forensics Investigator: Kali Linux skills are valuable for digital forensics professionals who investigate cybercrimes, analyze digital evidence, and recover compromised systems.

    6. SOC Analyst: Security Operations Center (SOC) analysts use Kali Linux tools to monitor and respond to security incidents, detect and mitigate threats, and maintain network and system security.

    7. Incident Responder: Kali Linux proficiency can lead you to a career as an incident responder. You would analyze security breaches, identify root causes, develop remediation plans, and implement preventive measures.

    8. Cybersecurity Consultant: As a cybersecurity consultant, you would assist clients with risk assessments, policy development, vulnerability assessments, and security strategy formulation, leveraging your Kali Linux knowledge.

    Remember, Kali Linux skills coupled with relevant certifications and experience significantly enhance your prospects for these roles.‎

    People who are best suited for studying Kali Linux are those who have a strong interest in cybersecurity and ethical hacking. They should have a basic understanding of computer systems, networking, and operating systems. Additionally, individuals who possess problem-solving skills, attention to detail, and a willingness to continuously learn and adapt to new technologies will excel in studying Kali Linux.‎

    There are several topics that you can study that are related to Kali Linux. Here are a few suggestions:

    1. Ethical Hacking: Kali Linux is widely used for ethical hacking purposes. You can study topics such as network scanning, vulnerability assessment, and penetration testing using Kali Linux.

    2. Cybersecurity: Kali Linux has numerous tools that are specifically designed for cybersecurity professionals. You can study topics like secure network communication, information security, and digital forensics using Kali Linux.

    3. Linux System Administration: Kali Linux is built on the Debian distribution of Linux and studying topics related to Linux system administration will enhance your understanding of Kali Linux. You can learn about package management, command-line tools, and Linux server administration.

    4. Wireless Network Security: Kali Linux provides tools for wireless network penetration testing and securing Wi-Fi networks. You can study topics like wireless encryption, network sniffing, and securing wireless networks using Kali Linux.

    5. Web Application Security: Kali Linux offers tools for testing the security of web applications. You can study topics such as web application vulnerabilities, SQL injection, cross-site scripting, and web application firewall testing using Kali Linux.

    6. Digital Privacy: Kali Linux includes tools for protecting your digital privacy and enhancing online anonymity. You can study topics like Tor network, VPN setup, encryption methods, and securing personal data using Kali Linux.

    These topics will help you gain a deep understanding of Kali Linux and its applications in various domains.‎

    Online Kali Linux courses offer a convenient and flexible way to enhance your knowledge or learn new Kali Linux is an open-source operating system primarily used for penetration testing and digital forensics. It provides a wide range of tools and applications that assist in identifying security vulnerabilities and testing the security of computer systems. Developed by Offensive Security, Kali Linux is widely used by cybersecurity professionals and ethical hackers for various purposes, including network reconnaissance, vulnerability scanning, password cracking, and more. It is known for its extensive collection of pre-installed software packages and continuous updates to ensure the latest tools are available for cybersecurity researchers and professionals. skills. Choose from a wide range of Kali Linux courses offered by top universities and industry leaders tailored to various skill levels.‎

    When looking to enhance your workforce's skills in Kali Linux, it's crucial to select a course that aligns with their current abilities and learning objectives. Our Skills Dashboard is an invaluable tool for identifying skill gaps and choosing the most appropriate course for effective upskilling. For a comprehensive understanding of how our courses can benefit your employees, explore the enterprise solutions we offer. Discover more about our tailored programs at Coursera for Business here.‎

    This FAQ content has been made available for informational purposes only. Learners are advised to conduct additional research to ensure that courses and other credentials pursued meet their personal, professional, and financial goals.

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog
    • Teaching Center

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok