Kali Linux: Auditing, Pentesting, Offensive Security, and Ethical Hacking

€855.00
| /

________________________________________________________________

Are you interested in this course in online or in-person format?
Contact us

📧info@nanforiberica.com • 📞+34 91 031 66 78 • 📱 +34 685 60 05 91 (WhatsApp) • 🏢 Our Offices

________________________________________________________________

Kali Linux Course: Auditing, Pentesting, Offensive Security, and Ethical Hacking

This course is delivered online and consists of 8 units and a final project. The duration of the course is distributed between content and collaboration tools. Upon completion, the student will receive an accreditation diploma.

The training is conducted through our Virtual Campus, with this modality you will have all the didactic content on the course platform and it will be accessible, from the start date of the course, 24 hours a day, every day of the week. The student will also have access to participation forums, as well as continuous tutoring.

 

Kali Linux - Security Auditing - Professional Pentesting - Ethical Hacking - Offensive Security - Advanced Cybersecurity - Ethical Hacking - Vulnerability Analysis - Penetration Testing

 

Introduction

This course provides comprehensive and practical training in network auditing, penetration testing, vulnerability analysis, and offensive security, using Kali Linux as the main work platform. Students will learn to navigate real security assessment environments using professional techniques for reconnaissance, scanning, exploitation, traffic analysis, and post-exploitation.

Kali Linux is the industry standard distribution for penetration testing and cybersecurity, offering hundreds of advanced tools for research, auditing, digital forensics, and Red Team operations. Throughout the course, participants will work with practical labs, vulnerable environments, and recognized methodologies, building the necessary skills to operate as a cybersecurity technician, junior pentester, or offensive security analyst.

 

Aimed at

This course is aimed at:

  • Technical profiles who wish to get started in penetration testing, offensive security, and ethical hacking.
  • System and network administrators looking to strengthen the security of their infrastructures.
  • SOC analysts, Blue Team members, or IT professionals who want to understand offensive techniques to improve defense.
  • Cybersecurity students who require practical experience with professional methodology.
  • Candidates beginning their journey towards security or Linux certifications.

 

Training objectives

Upon completion of the training, students will be able to:

  • Use Kali Linux as a professional environment for auditing and penetration testing.
  • Apply reconnaissance, scanning, and enumeration techniques in network infrastructures.
  • Identify and exploit vulnerabilities in controlled environments.
  • Analyze network traffic and detect potential attack vectors.
  • Execute basic tests on wireless networks and detect weaknesses. 
  • Understand the formal methodology of a professional pentest. 
  • Perform post-exploitation tasks on Linux systems.
  • Prepare professional technical reports, following best practices and standards. 
  • Act in accordance with the principles of ethical hacking and within the current legal framework.

 

Kali Linux course content: Auditing, Pentesting, Offensive Security and Ethical Hacking

Unit 1 – Introduction

  • Course presentation and objectives
  • Prerequisites (basic Linux, networks)
  • What is Kali Linux and what is it used for?
  • Kali Installation (VMWare, VirtualBox, LiveUSB)

Unit 2 – Basic configuration and tools

  • Initial Kali Linux configuration
  • Network interface management and IP configuration
  • Essential network tools: `ifconfig`, `ip`, `netstat`, `ss`, `nmap`, `tcpdump`, `wireshark`
  • Repositories and system update

Unit 3 – Network scanning and discovery

  • Passive vs. active reconnaissance
  • Advanced use of `nmap` (NSE scripts, custom scans)
  • Discovery of devices, services, and ports
  • Operating system and service fingerprinting

Unit 4 – Traffic analysis

  • Capture and analysis with `Wireshark`
  • Filters and TCP session tracking
  • Sniffing techniques with `tcpdump`, `ettercap`
  • Protocol analysis: HTTP, DNS, SMB, FTP

Unit 5 – Network and service attacks

  • Introduction to MITM (Man-in-the-middle)
  • ARP Spoofing and DNS Spoofing
  • Credential capture and traffic manipulation
  • Attacks on common services: SSH, FTP, Telnet, HTTP

Unit 6 – Vulnerability exploitation

  • Scanning with `Nikto`, `OpenVAS`, `Metasploit`
  • Vulnerability reconnaissance in services
  • Exploitation of insecure services with `Metasploit`
  • Payload generation and reverse shells

Unit 7 – Wireless security

  • Monitoring and scanning WiFi networks
  • WPA/WPA2 key cracking with `aircrack-ng`
  • Deauthentication attacks
  • Handshake capture

Unit 8 – Reports and best practices

  • How to document findings
  • Generation of technical reports with tools like `Dradis`
  • Professional ethics and legality of testing
  • Defensive measures after an audit
  • Evaluation and practices
  • Practical labs in each unit
  • Access to simulated networks or platforms like TryHackMe

Final project: Complete audit of a simulated network

  • Submission of technical report

 

Prerequisites

To fully benefit from this course, participants are recommended to have:

  • Interest in cybersecurity and how computer systems work.
  • Analytical attitude, investigative curiosity, and problem-solving skills.
  • Basic understanding of the general functioning of the Internet and systems, even if no deep knowledge is possessed.
  • Ethical commitment, understanding the importance of using learned techniques only in authorized environments. 
  • Desire to learn practically through labs and exercises with simulated environments (TryHackMe, vulnerable machines, etc.).

Note: Prior experience in pentesting or having used Kali Linux before is not mandatory; the course is designed to guide students from the fundamentals.

 

Other training modalities

If you are interested in taking this course in person or via telepresence, please contact us:

💡 Did you know this course is included in LaaS Cert?

Take this course and many more with our LaaS Cert annual license . Unlimited training for only €1,295!

✅ Microsoft, Linux-LPI, SCRUM, ITIL and Nanfor technical courses

✅ Personalized support always by your side

✅ 100% online, official and updated

Get your license now!

LaaS cert Formación ilimitada

Information related to training

Soporte siempre a tu lado

Training support

Always by your side

Modalidades Formativas

Training modalities

Self Learning - Virtual - In-person - Telepresence

bonificaciones

Bonuses

For companies