• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Kali Linux

    Kali Linux Courses Online

    Learn Kali Linux for penetration testing and security auditing. Understand how to use its tools for ethical hacking and vulnerability assessment.

    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Build job-relevant skills in under 2 hours with hands-on tutorials.
    Learn from top instructors with graded assignments, videos, and discussion forums.
    Learn a new tool or skill in an interactive, hands-on environment.
    Get in-depth knowledge of a subject by completing a series of courses and projects.
    Earn career credentials from industry leaders that demonstrate your expertise.

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Explore the Kali Linux Course Catalog

    • I

      IBM

      IBM Storage Scale Remote Data Access

      Skills you'll gain: Disaster Recovery, Remote Access Systems, File Systems, Data Access, Data Storage, File Management, Network Planning And Design, Distributed Computing, Network Protocols, System Configuration, System Implementation, Configuration Management, Open Source Technology

      5
      Rating, 5 out of 5 stars
      ·
      9 reviews

      Intermediate · Course · 1 - 3 Months

    • I

      IBM

      Data Storage Fundamentals with IBM Storage Scale

      Skills you'll gain: Data Storage, File Systems, Servers, Data Management, Disaster Recovery, Data Integrity, Data Security, Configuration Management, System Configuration, Scalability, Software Installation

      Beginner · Course · 1 - 3 Months

    • Status: New
      New
      P

      Packt

      Linux Shell Scripting - Advanced

      Skills you'll gain: Shell Script, Bash (Scripting Language), Unix Shell, Linux Commands, Scripting, Unix Commands, Linux, Unix, Command-Line Interface, User Interface (UI), Graphical Tools

      Advanced · Course · 1 - 3 Months

    • P

      Packt

      AWS, JavaScript, React - Deploy Web Apps on the Cloud

      Skills you'll gain: AWS Identity and Access Management (IAM), Linux Administration, Amazon Elastic Compute Cloud, Identity and Access Management, Cloud Computing, Cloud Infrastructure, Amazon Web Services, Linux Servers, Cloud Hosting, Cloud Platforms, Cloud Management, React.js, Full-Stack Web Development, Linux, Scalability, Javascript, Application Development, User Interface (UI), Web Development, Restful API

      Intermediate · Specialization · 3 - 6 Months

    • Status: Free
      Free
      C

      Coursera Project Network

      إنشاء تطبيق قابل للتوسع باستخدام AWS EKS عبر AWS Console

      Skills you'll gain: Application Deployment, Kubernetes, AWS Identity and Access Management (IAM), Amazon Elastic Compute Cloud, Amazon Web Services, Cloud Applications, AWS CloudFormation, DevOps, Cloud Development, Load Balancing, Containerization, Scalability

      4.8
      Rating, 4.8 out of 5 stars
      ·
      6 reviews

      Intermediate · Course · 1 - 4 Weeks

    • W

      Whizlabs

      AWS: CI/CD Pipelines and Deployment Strategies

      Skills you'll gain: CI/CD, Application Deployment, Software Development Life Cycle, Continuous Deployment, Continuous Integration, Amazon Web Services, AWS CloudFormation, Amazon Elastic Compute Cloud, Regression Testing, Unit Testing, Infrastructure as Code (IaC), Docker (Software), Containerization, Amazon S3, Git (Version Control System)

      Intermediate · Course · 1 - 4 Weeks

    • A

      Alibaba Cloud Academy

      Development and Operation on Alibaba Cloud

      Skills you'll gain: Docker (Software), Containerization, Application Deployment, Kubernetes, Terraform, Prometheus (Software), Cloud Computing, Performance Tuning, Application Performance Management, Cloud Management, Cloud Applications, DevOps, Performance Testing, Cloud Infrastructure, Database Management, Relational Databases, Systems Administration, Redis, Cloud Platforms, Database Administration

      4.7
      Rating, 4.7 out of 5 stars
      ·
      9 reviews

      Beginner · Specialization · 3 - 6 Months

    • M

      Meta

      التحكم في الإصدار

      Skills you'll gain: Version Control, GitHub, Git (Version Control System), Command-Line Interface, Software Versioning, Linux Commands, Software Development Tools, Collaborative Software, Software Development, Program Development, File Management

      Beginner · Course · 1 - 4 Weeks

    • K

      KodeKloud

      Git for beginners with Hands-on Labs

      Skills you'll gain: Git (Version Control System), GitHub, Version Control, Collaborative Software, DevOps, Continuous Integration, File Management, Software Installation

      Beginner · Course · 1 - 3 Months

    • P

      Packt

      Advanced DevOps Tools and Practices

      Skills you'll gain: Devops Tools, Ansible, Docker (Software), Kubernetes, CI/CD, Containerization, Prometheus (Software), DevOps, Continuous Deployment, System Monitoring, Jenkins, Continuous Integration, YAML, Software Development Tools, Infrastructure as Code (IaC), Grafana, Continuous Delivery, Application Deployment, Scalability, Microservices

      Intermediate · Course · 1 - 3 Months

    • S

      SkillUp EdTech

      AZ-800 Exam Prep

      Skills you'll gain: Group Policy, Dynamic Host Configuration Protocol (DHCP), Azure Active Directory, Active Directory, Windows Servers, Hyper-V, Remote Access Systems, Virtual Private Networks (VPN), Containerization, Microsoft Azure, Kubernetes, Docker (Software), Hybrid Cloud Computing, Virtualization, Virtual Machines, Server Administration, Network Administration, Authentications, Infrastructure As A Service (IaaS), Network Infrastructure

      4.3
      Rating, 4.3 out of 5 stars
      ·
      6 reviews

      Intermediate · Specialization · 1 - 3 Months

    • I

      Infosec

      C++ Superpowers and More

      Skills you'll gain: Secure Coding, Application Security, System Programming, C++ (Programming Language), C (Programming Language), Unix, Embedded Systems, Debugging, Operating Systems, Data Security, Linux

      3.9
      Rating, 3.9 out of 5 stars
      ·
      11 reviews

      Mixed · Course · 1 - 4 Weeks

    Kali Linux learners also search

    Mobile Design
    Mobile Web
    Mobile App Development
    Beginner Mobile App Development
    App Development
    Android Programming
    Android
    Android Design
    1…303132…41

    In summary, here are 10 of our most popular kali linux courses

    • IBM Storage Scale Remote Data Access: IBM
    • Data Storage Fundamentals with IBM Storage Scale: IBM
    • Linux Shell Scripting - Advanced: Packt
    • AWS, JavaScript, React - Deploy Web Apps on the Cloud: Packt
    • إنشاء تطبيق قابل للتوسع باستخدام AWS EKS عبر AWS Console: Coursera Project Network
    • AWS: CI/CD Pipelines and Deployment Strategies: Whizlabs
    • Development and Operation on Alibaba Cloud: Alibaba Cloud Academy
    • التحكم في الإصدار: Meta
    • Git for beginners with Hands-on Labs: KodeKloud
    • Advanced DevOps Tools and Practices: Packt

    Skills you can learn in Computer Security And Networks

    Cybersecurity (33)
    Google (25)
    Google Cloud Platform (17)
    Internet (17)
    Cryptography (16)
    Network Security (16)
    Linux (12)
    Software Testing (12)
    Information Security (10)
    Application Programming Interfaces (8)
    Kubernetes (8)
    Web (8)

    Frequently Asked Questions about Kali Linux

    Kali Linux is an open-source operating system primarily used for penetration testing and digital forensics. It provides a wide range of tools and applications that assist in identifying security vulnerabilities and testing the security of computer systems. Developed by Offensive Security, Kali Linux is widely used by cybersecurity professionals and ethical hackers for various purposes, including network reconnaissance, vulnerability scanning, password cracking, and more. It is known for its extensive collection of pre-installed software packages and continuous updates to ensure the latest tools are available for cybersecurity researchers and professionals.‎

    To effectively use Kali Linux, you should consider mastering the following skills:

    1. Linux Command Line: Familiarize yourself with basic Linux commands and understand how the command line interface works. This will be crucial for navigating and interacting with Kali Linux effectively.

    2. Networking and TCP/IP: Gain understanding of network protocols, including TCP/IP, IP addressing, subnetting, and how they function. This knowledge will help you utilize Kali Linux's powerful networking tools.

    3. Ethical Hacking: As Kali Linux is primarily used for security testing and penetration testing, having a solid foundation in ethical hacking is essential. Learn about common vulnerabilities, security testing methodologies, and tools used for penetration testing.

    4. Web Application Security: Focus on web application security concepts like OWASP top 10 vulnerabilities, SQL injection, cross-site scripting (XSS), and other common web-based exploits. Kali Linux offers various tools specifically designed for web application security testing.

    5. Wireless Network Security: Since Kali Linux supports wireless penetration testing, understanding wireless security concepts such as encryption protocols, Wi-Fi hacking techniques, and tools such as Aircrack-ng will be beneficial.

    6. Password Cracking: Learn about different password cracking techniques, such as brute-forcing, dictionary attacks, and rainbow tables. Familiarize yourself with tools like John the Ripper, Hashcat, and Hydra, which are commonly used in Kali Linux for this purpose.

    7. Vulnerability Assessment: Acquire knowledge about various vulnerability assessment techniques, including scanning networks and systems for vulnerabilities, analyzing results, and suggesting mitigation strategies. Tools like OpenVAS and Nessus are popular choices for vulnerability assessment.

    Remember, as Kali Linux is a powerful tool with significant implications, ethical usage and adherence to legal boundaries are crucial. Always ensure you use it responsibly and obtain proper authorization when performing security testing on systems and networks.‎

    With Kali Linux skills, you can pursue various rewarding job opportunities. Some of the jobs that align with Kali Linux skills include:

    1. Ethical Hacker/Penetration Tester: Kali Linux is a preferred operating system for ethical hackers and penetration testers who identify vulnerabilities in networks and systems to enhance their security.

    2. Cybersecurity Analyst: Kali Linux skills are highly sought after in the field of cybersecurity. As a cybersecurity analyst, you would use Kali Linux to assess and defend against cyber threats, conduct security audits, and implement protective measures.

    3. Security Consultant: With Kali Linux expertise, you can work as a security consultant, advising organizations on strengthening their security infrastructure, performing risk assessments, and developing incident response plans.

    4. Network Security Engineer: In this role, you would utilize Kali Linux skills to design and implement secure network architectures, configure firewalls, monitor network traffic, and respond to security incidents.

    5. Digital Forensics Investigator: Kali Linux skills are valuable for digital forensics professionals who investigate cybercrimes, analyze digital evidence, and recover compromised systems.

    6. SOC Analyst: Security Operations Center (SOC) analysts use Kali Linux tools to monitor and respond to security incidents, detect and mitigate threats, and maintain network and system security.

    7. Incident Responder: Kali Linux proficiency can lead you to a career as an incident responder. You would analyze security breaches, identify root causes, develop remediation plans, and implement preventive measures.

    8. Cybersecurity Consultant: As a cybersecurity consultant, you would assist clients with risk assessments, policy development, vulnerability assessments, and security strategy formulation, leveraging your Kali Linux knowledge.

    Remember, Kali Linux skills coupled with relevant certifications and experience significantly enhance your prospects for these roles.‎

    People who are best suited for studying Kali Linux are those who have a strong interest in cybersecurity and ethical hacking. They should have a basic understanding of computer systems, networking, and operating systems. Additionally, individuals who possess problem-solving skills, attention to detail, and a willingness to continuously learn and adapt to new technologies will excel in studying Kali Linux.‎

    There are several topics that you can study that are related to Kali Linux. Here are a few suggestions:

    1. Ethical Hacking: Kali Linux is widely used for ethical hacking purposes. You can study topics such as network scanning, vulnerability assessment, and penetration testing using Kali Linux.

    2. Cybersecurity: Kali Linux has numerous tools that are specifically designed for cybersecurity professionals. You can study topics like secure network communication, information security, and digital forensics using Kali Linux.

    3. Linux System Administration: Kali Linux is built on the Debian distribution of Linux and studying topics related to Linux system administration will enhance your understanding of Kali Linux. You can learn about package management, command-line tools, and Linux server administration.

    4. Wireless Network Security: Kali Linux provides tools for wireless network penetration testing and securing Wi-Fi networks. You can study topics like wireless encryption, network sniffing, and securing wireless networks using Kali Linux.

    5. Web Application Security: Kali Linux offers tools for testing the security of web applications. You can study topics such as web application vulnerabilities, SQL injection, cross-site scripting, and web application firewall testing using Kali Linux.

    6. Digital Privacy: Kali Linux includes tools for protecting your digital privacy and enhancing online anonymity. You can study topics like Tor network, VPN setup, encryption methods, and securing personal data using Kali Linux.

    These topics will help you gain a deep understanding of Kali Linux and its applications in various domains.‎

    Online Kali Linux courses offer a convenient and flexible way to enhance your knowledge or learn new Kali Linux is an open-source operating system primarily used for penetration testing and digital forensics. It provides a wide range of tools and applications that assist in identifying security vulnerabilities and testing the security of computer systems. Developed by Offensive Security, Kali Linux is widely used by cybersecurity professionals and ethical hackers for various purposes, including network reconnaissance, vulnerability scanning, password cracking, and more. It is known for its extensive collection of pre-installed software packages and continuous updates to ensure the latest tools are available for cybersecurity researchers and professionals. skills. Choose from a wide range of Kali Linux courses offered by top universities and industry leaders tailored to various skill levels.‎

    When looking to enhance your workforce's skills in Kali Linux, it's crucial to select a course that aligns with their current abilities and learning objectives. Our Skills Dashboard is an invaluable tool for identifying skill gaps and choosing the most appropriate course for effective upskilling. For a comprehensive understanding of how our courses can benefit your employees, explore the enterprise solutions we offer. Discover more about our tailored programs at Coursera for Business here.‎

    This FAQ content has been made available for informational purposes only. Learners are advised to conduct additional research to ensure that courses and other credentials pursued meet their personal, professional, and financial goals.

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog
    • Teaching Center

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok