________________________________________________________________
Are you interested in this course in online or in-person format?
Contact us
📧info@nanforiberica.com • 📞+34 91 031 66 78 • 📱 +34 685 60 05 91 (WhatsApp) • 🏢 Our Offices
________________________________________________________________
Kali Linux Course: Auditing, Pentesting, Offensive Security, and Ethical Hacking
This course is delivered online and consists of 8 units and a final project. The duration of the course is distributed between content and collaboration tools. Upon completion, the student will receive an accreditation diploma.
The training is conducted through our Virtual Campus, with this modality you will have all the didactic content on the course platform and it will be accessible, from the start date of the course, 24 hours a day, every day of the week. The student will also have access to participation forums, as well as continuous tutoring.
Kali Linux - Security Auditing - Professional Pentesting - Ethical Hacking - Offensive Security - Advanced Cybersecurity - Ethical Hacking - Vulnerability Analysis - Penetration Testing
Introduction
This course provides comprehensive and practical training in network auditing, penetration testing, vulnerability analysis, and offensive security, using Kali Linux as the main work platform. Students will learn to navigate real security assessment environments using professional techniques for reconnaissance, scanning, exploitation, traffic analysis, and post-exploitation.
Kali Linux is the industry standard distribution for penetration testing and cybersecurity, offering hundreds of advanced tools for research, auditing, digital forensics, and Red Team operations. Throughout the course, participants will work with practical labs, vulnerable environments, and recognized methodologies, building the necessary skills to operate as a cybersecurity technician, junior pentester, or offensive security analyst.
Aimed at
This course is aimed at:
- Technical profiles who wish to get started in penetration testing, offensive security, and ethical hacking.
- System and network administrators looking to strengthen the security of their infrastructures.
- SOC analysts, Blue Team members, or IT professionals who want to understand offensive techniques to improve defense.
- Cybersecurity students who require practical experience with professional methodology.
- Candidates beginning their journey towards security or Linux certifications.
Training objectives
Upon completion of the training, students will be able to:
- Use Kali Linux as a professional environment for auditing and penetration testing.
- Apply reconnaissance, scanning, and enumeration techniques in network infrastructures.
- Identify and exploit vulnerabilities in controlled environments.
- Analyze network traffic and detect potential attack vectors.
- Execute basic tests on wireless networks and detect weaknesses.
- Understand the formal methodology of a professional pentest.
- Perform post-exploitation tasks on Linux systems.
- Prepare professional technical reports, following best practices and standards.
- Act in accordance with the principles of ethical hacking and within the current legal framework.
Kali Linux course content: Auditing, Pentesting, Offensive Security and Ethical Hacking
Unit 1 – Introduction
- Course presentation and objectives
- Prerequisites (basic Linux, networks)
- What is Kali Linux and what is it used for?
- Kali Installation (VMWare, VirtualBox, LiveUSB)
Unit 2 – Basic configuration and tools
- Initial Kali Linux configuration
- Network interface management and IP configuration
- Essential network tools: `ifconfig`, `ip`, `netstat`, `ss`, `nmap`, `tcpdump`, `wireshark`
- Repositories and system update
Unit 3 – Network scanning and discovery
- Passive vs. active reconnaissance
- Advanced use of `nmap` (NSE scripts, custom scans)
- Discovery of devices, services, and ports
- Operating system and service fingerprinting
Unit 4 – Traffic analysis
- Capture and analysis with `Wireshark`
- Filters and TCP session tracking
- Sniffing techniques with `tcpdump`, `ettercap`
- Protocol analysis: HTTP, DNS, SMB, FTP
Unit 5 – Network and service attacks
- Introduction to MITM (Man-in-the-middle)
- ARP Spoofing and DNS Spoofing
- Credential capture and traffic manipulation
- Attacks on common services: SSH, FTP, Telnet, HTTP
Unit 6 – Vulnerability exploitation
- Scanning with `Nikto`, `OpenVAS`, `Metasploit`
- Vulnerability reconnaissance in services
- Exploitation of insecure services with `Metasploit`
- Payload generation and reverse shells
Unit 7 – Wireless security
- Monitoring and scanning WiFi networks
- WPA/WPA2 key cracking with `aircrack-ng`
- Deauthentication attacks
- Handshake capture
Unit 8 – Reports and best practices
- How to document findings
- Generation of technical reports with tools like `Dradis`
- Professional ethics and legality of testing
- Defensive measures after an audit
- Evaluation and practices
- Practical labs in each unit
- Access to simulated networks or platforms like TryHackMe
Final project: Complete audit of a simulated network
- Submission of technical report
Prerequisites
To fully benefit from this course, participants are recommended to have:
- Interest in cybersecurity and how computer systems work.
- Analytical attitude, investigative curiosity, and problem-solving skills.
- Basic understanding of the general functioning of the Internet and systems, even if no deep knowledge is possessed.
- Ethical commitment, understanding the importance of using learned techniques only in authorized environments.
- Desire to learn practically through labs and exercises with simulated environments (TryHackMe, vulnerable machines, etc.).
Note: Prior experience in pentesting or having used Kali Linux before is not mandatory; the course is designed to guide students from the fundamentals.
Other training modalities
If you are interested in taking this course in person or via telepresence, please contact us: