• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Kali Linux

    Kali Linux Courses Online

    Learn Kali Linux for penetration testing and security auditing. Understand how to use its tools for ethical hacking and vulnerability assessment.

    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Build job-relevant skills in under 2 hours with hands-on tutorials.
    Learn from top instructors with graded assignments, videos, and discussion forums.
    Learn a new tool or skill in an interactive, hands-on environment.
    Get in-depth knowledge of a subject by completing a series of courses and projects.
    Earn career credentials from industry leaders that demonstrate your expertise.

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Explore the Kali Linux Course Catalog

    • U

      University of Colorado Boulder

      Real-Time Embedded Systems

      Skills you'll gain: Real-Time Operating Systems, Embedded Systems, Reliability, Performance Tuning, Embedded Software, Hardware Architecture, Software Design, Debugging, Software Architecture, Verification And Validation, Hardware Design, System Design and Implementation, Linux, Code Review, System Programming, Software Systems, Systems Architecture, Real Time Data, Performance Testing, Testability

      Build toward a degree

      3.9
      Rating, 3.9 out of 5 stars
      ·
      105 reviews

      Intermediate · Specialization · 3 - 6 Months

    • I

      IBM

      IBM Applied DevOps Engineering

      Skills you'll gain: CI/CD, Istio, Open Web Application Security Project (OWASP), Continuous Integration, Agile Software Development, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Jenkins, Kubernetes, DevOps, Code Coverage, OpenShift, Cloud Applications, Containerization, Agile Methodology, Behavior-Driven Development, Secure Coding, Grafana, System Monitoring

      Build toward a degree

      4.7
      Rating, 4.7 out of 5 stars
      ·
      7.1K reviews

      Intermediate · Professional Certificate · 3 - 6 Months

    • Status: AI skills
      AI skills
      I

      IBM

      IBM Data Engineering

      Skills you'll gain: NoSQL, Data Warehousing, SQL, Apache Hadoop, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, IBM Cognos Analytics, MySQL, Apache Spark, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Data Store, Jupyter, Generative AI, Professional Networking

      Build toward a degree

      4.6
      Rating, 4.6 out of 5 stars
      ·
      58K reviews

      Beginner · Professional Certificate · 3 - 6 Months

    • D

      Dartmouth College

      C Programming with Linux

      Skills you'll gain: Command-Line Interface, C (Programming Language), Linux Commands, Computer Programming Tools, Embedded Systems, Embedded Software, Programming Principles, Computer Engineering, Linux Servers, Linux, File Systems, System Programming, Build Tools, Data Structures, Unix, Program Development, Development Environment, Algorithms, Computer Architecture, Software Documentation

      4.6
      Rating, 4.6 out of 5 stars
      ·
      397 reviews

      Beginner · Specialization · 3 - 6 Months

    • G

      Google Cloud

      Preparing for Google Cloud Certification: Cloud Developer

      Skills you'll gain: Containerization, Cloud Applications, Google Cloud Platform, Cloud Infrastructure, Application Deployment, Docker (Software), Kubernetes, Application Development, CI/CD, Cloud Development, Microservices, Authentications, Serverless Computing, Identity and Access Management, Cloud Storage, Cloud Services, Virtual Machines, Generative AI, Cloud API, Prompt Engineering

      4.7
      Rating, 4.7 out of 5 stars
      ·
      49K reviews

      Intermediate · Professional Certificate · 3 - 6 Months

    • G

      Google

      Google IT Automation with Python

      Skills you'll gain: Git (Version Control System), GitHub, Version Control, Cloud Services, Debugging, Puppet (Configuration Management Tool), Infrastructure as Code (IaC), Bash (Scripting Language), Configuration Management, CI/CD, Cloud Computing, Technical Communication, Docker (Software), Unit Testing, Scripting, Network Troubleshooting, Web Services, Python Programming, Restful API, Programming Principles

      4.7
      Rating, 4.7 out of 5 stars
      ·
      48K reviews

      Advanced · Professional Certificate · 3 - 6 Months

    • A

      Amazon Web Services

      AWS Cloud Support Associate

      Skills you'll gain: AWS Identity and Access Management (IAM), Infrastructure as Code (IaC), Command-Line Interface, Amazon CloudWatch, AWS CloudFormation, Root Cause Analysis, Amazon DynamoDB, Customer Relationship Building, Network Troubleshooting, Amazon Web Services, Customer Relationship Management, Software Architecture, IT Automation, Linux Commands, Cloud Computing, Linux, Amazon S3, Scalability, Technical Support, Web Applications

      4.8
      Rating, 4.8 out of 5 stars
      ·
      6.3K reviews

      Beginner · Professional Certificate · 3 - 6 Months

    • I

      IBM

      IBM Back-End Development

      Skills you'll gain: Istio, Open Web Application Security Project (OWASP), Software Development Life Cycle, Linux Commands, Unit Testing, Object-Relational Mapping, Application Deployment, NoSQL, Kubernetes, Bash (Scripting Language), MongoDB, Shell Script, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Serverless Computing, Jupyter, Grafana

      4.6
      Rating, 4.6 out of 5 stars
      ·
      48K reviews

      Beginner · Professional Certificate · 3 - 6 Months

    • M

      Meta

      Version Control

      Skills you'll gain: Version Control, Unix Commands, Git (Version Control System), GitHub, Linux Commands, Command-Line Interface, Software Versioning, Collaborative Software, File Management, Software Development Tools, Software Development

      4.6
      Rating, 4.6 out of 5 stars
      ·
      3.6K reviews

      Beginner · Course · 1 - 4 Weeks

    • G

      Google

      Ciberseguridad de Google

      Skills you'll gain: Vulnerability Management, Threat Modeling, Incident Response, Intrusion Detection and Prevention, Business Risk Management, Network Security, Operating Systems, Threat Detection, Risk Management, Security Information and Event Management (SIEM), Computer Security Incident Management, Security Awareness, Event Monitoring, Network Architecture, Security Controls, Cyber Risk, Linux, TCP/IP, Cybersecurity, Debugging

      4.9
      Rating, 4.9 out of 5 stars
      ·
      6.7K reviews

      Beginner · Professional Certificate · 3 - 6 Months

    • C

      Codio

      Unix and Bash for Beginners

      Skills you'll gain: Package and Software Management, User Accounts, Unix Commands, Unix, Bash (Scripting Language), Command-Line Interface, Kubernetes, Git (Version Control System), GitHub, OS Process Management, Version Control, Firewall, Docker (Software), Containerization, Network Monitoring, Unix Shell, TCP/IP, Application Deployment, Data Storage, Network Protocols

      4
      Rating, 4 out of 5 stars
      ·
      97 reviews

      Beginner · Specialization · 3 - 6 Months

    • I

      IBM

      IT Fundamentals for Cybersecurity

      Skills you'll gain: IT Service Management, Cloud Computing, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Linux Administration, Network Security, Network Protocols, Computer Security Incident Management, Cloud Security, Operating Systems, Endpoint Detection and Response, Cyber Risk, Data Ethics, Cyber Governance

      4.6
      Rating, 4.6 out of 5 stars
      ·
      22K reviews

      Beginner · Specialization · 3 - 6 Months

    Kali Linux learners also search

    Mobile Design
    Mobile Web
    Mobile App Development
    Beginner Mobile App Development
    App Development
    Android Programming
    Android
    Android Design
    1…456…41

    In summary, here are 10 of our most popular kali linux courses

    • Real-Time Embedded Systems: University of Colorado Boulder
    • IBM Applied DevOps Engineering: IBM
    • IBM Data Engineering: IBM
    • C Programming with Linux: Dartmouth College
    • Preparing for Google Cloud Certification: Cloud Developer: Google Cloud
    • Google IT Automation with Python: Google
    • AWS Cloud Support Associate: Amazon Web Services
    • IBM Back-End Development: IBM
    • Version Control: Meta
    • Ciberseguridad de Google: Google

    Skills you can learn in Computer Security And Networks

    Cybersecurity (33)
    Google (25)
    Google Cloud Platform (17)
    Internet (17)
    Cryptography (16)
    Network Security (16)
    Linux (12)
    Software Testing (12)
    Information Security (10)
    Application Programming Interfaces (8)
    Kubernetes (8)
    Web (8)

    Frequently Asked Questions about Kali Linux

    Kali Linux is an open-source operating system primarily used for penetration testing and digital forensics. It provides a wide range of tools and applications that assist in identifying security vulnerabilities and testing the security of computer systems. Developed by Offensive Security, Kali Linux is widely used by cybersecurity professionals and ethical hackers for various purposes, including network reconnaissance, vulnerability scanning, password cracking, and more. It is known for its extensive collection of pre-installed software packages and continuous updates to ensure the latest tools are available for cybersecurity researchers and professionals.‎

    To effectively use Kali Linux, you should consider mastering the following skills:

    1. Linux Command Line: Familiarize yourself with basic Linux commands and understand how the command line interface works. This will be crucial for navigating and interacting with Kali Linux effectively.

    2. Networking and TCP/IP: Gain understanding of network protocols, including TCP/IP, IP addressing, subnetting, and how they function. This knowledge will help you utilize Kali Linux's powerful networking tools.

    3. Ethical Hacking: As Kali Linux is primarily used for security testing and penetration testing, having a solid foundation in ethical hacking is essential. Learn about common vulnerabilities, security testing methodologies, and tools used for penetration testing.

    4. Web Application Security: Focus on web application security concepts like OWASP top 10 vulnerabilities, SQL injection, cross-site scripting (XSS), and other common web-based exploits. Kali Linux offers various tools specifically designed for web application security testing.

    5. Wireless Network Security: Since Kali Linux supports wireless penetration testing, understanding wireless security concepts such as encryption protocols, Wi-Fi hacking techniques, and tools such as Aircrack-ng will be beneficial.

    6. Password Cracking: Learn about different password cracking techniques, such as brute-forcing, dictionary attacks, and rainbow tables. Familiarize yourself with tools like John the Ripper, Hashcat, and Hydra, which are commonly used in Kali Linux for this purpose.

    7. Vulnerability Assessment: Acquire knowledge about various vulnerability assessment techniques, including scanning networks and systems for vulnerabilities, analyzing results, and suggesting mitigation strategies. Tools like OpenVAS and Nessus are popular choices for vulnerability assessment.

    Remember, as Kali Linux is a powerful tool with significant implications, ethical usage and adherence to legal boundaries are crucial. Always ensure you use it responsibly and obtain proper authorization when performing security testing on systems and networks.‎

    With Kali Linux skills, you can pursue various rewarding job opportunities. Some of the jobs that align with Kali Linux skills include:

    1. Ethical Hacker/Penetration Tester: Kali Linux is a preferred operating system for ethical hackers and penetration testers who identify vulnerabilities in networks and systems to enhance their security.

    2. Cybersecurity Analyst: Kali Linux skills are highly sought after in the field of cybersecurity. As a cybersecurity analyst, you would use Kali Linux to assess and defend against cyber threats, conduct security audits, and implement protective measures.

    3. Security Consultant: With Kali Linux expertise, you can work as a security consultant, advising organizations on strengthening their security infrastructure, performing risk assessments, and developing incident response plans.

    4. Network Security Engineer: In this role, you would utilize Kali Linux skills to design and implement secure network architectures, configure firewalls, monitor network traffic, and respond to security incidents.

    5. Digital Forensics Investigator: Kali Linux skills are valuable for digital forensics professionals who investigate cybercrimes, analyze digital evidence, and recover compromised systems.

    6. SOC Analyst: Security Operations Center (SOC) analysts use Kali Linux tools to monitor and respond to security incidents, detect and mitigate threats, and maintain network and system security.

    7. Incident Responder: Kali Linux proficiency can lead you to a career as an incident responder. You would analyze security breaches, identify root causes, develop remediation plans, and implement preventive measures.

    8. Cybersecurity Consultant: As a cybersecurity consultant, you would assist clients with risk assessments, policy development, vulnerability assessments, and security strategy formulation, leveraging your Kali Linux knowledge.

    Remember, Kali Linux skills coupled with relevant certifications and experience significantly enhance your prospects for these roles.‎

    People who are best suited for studying Kali Linux are those who have a strong interest in cybersecurity and ethical hacking. They should have a basic understanding of computer systems, networking, and operating systems. Additionally, individuals who possess problem-solving skills, attention to detail, and a willingness to continuously learn and adapt to new technologies will excel in studying Kali Linux.‎

    There are several topics that you can study that are related to Kali Linux. Here are a few suggestions:

    1. Ethical Hacking: Kali Linux is widely used for ethical hacking purposes. You can study topics such as network scanning, vulnerability assessment, and penetration testing using Kali Linux.

    2. Cybersecurity: Kali Linux has numerous tools that are specifically designed for cybersecurity professionals. You can study topics like secure network communication, information security, and digital forensics using Kali Linux.

    3. Linux System Administration: Kali Linux is built on the Debian distribution of Linux and studying topics related to Linux system administration will enhance your understanding of Kali Linux. You can learn about package management, command-line tools, and Linux server administration.

    4. Wireless Network Security: Kali Linux provides tools for wireless network penetration testing and securing Wi-Fi networks. You can study topics like wireless encryption, network sniffing, and securing wireless networks using Kali Linux.

    5. Web Application Security: Kali Linux offers tools for testing the security of web applications. You can study topics such as web application vulnerabilities, SQL injection, cross-site scripting, and web application firewall testing using Kali Linux.

    6. Digital Privacy: Kali Linux includes tools for protecting your digital privacy and enhancing online anonymity. You can study topics like Tor network, VPN setup, encryption methods, and securing personal data using Kali Linux.

    These topics will help you gain a deep understanding of Kali Linux and its applications in various domains.‎

    Online Kali Linux courses offer a convenient and flexible way to enhance your knowledge or learn new Kali Linux is an open-source operating system primarily used for penetration testing and digital forensics. It provides a wide range of tools and applications that assist in identifying security vulnerabilities and testing the security of computer systems. Developed by Offensive Security, Kali Linux is widely used by cybersecurity professionals and ethical hackers for various purposes, including network reconnaissance, vulnerability scanning, password cracking, and more. It is known for its extensive collection of pre-installed software packages and continuous updates to ensure the latest tools are available for cybersecurity researchers and professionals. skills. Choose from a wide range of Kali Linux courses offered by top universities and industry leaders tailored to various skill levels.‎

    When looking to enhance your workforce's skills in Kali Linux, it's crucial to select a course that aligns with their current abilities and learning objectives. Our Skills Dashboard is an invaluable tool for identifying skill gaps and choosing the most appropriate course for effective upskilling. For a comprehensive understanding of how our courses can benefit your employees, explore the enterprise solutions we offer. Discover more about our tailored programs at Coursera for Business here.‎

    This FAQ content has been made available for informational purposes only. Learners are advised to conduct additional research to ensure that courses and other credentials pursued meet their personal, professional, and financial goals.

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog
    • Teaching Center

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok