Kali Linux: Auditing, Pentesting, Offensive Security, and Ethical Hacking

€855.00
| /

________________________________________________________________

Do you want to take this course remotely or in person?

Contact us by email: info@nanforiberica.com , phone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91 , or contact Our Offices

________________________________________________________________

Kali Linux Course: Auditing, Pentesting, Offensive Security and Ethical Hacking

This course is taught in online format and consists of 8 units and a final project. The duration of the course is distributes between the content and the collaboration tools. Upon completion, the student will receive a certificate of completion.

The training is conducted through our Virtual Campus, With this option, you will have access to all the course content on the platform, 24 hours a day, 7 days a week, from the first day of the course. Students will also have access to participation forums , as well as a continuous tutoring .

Kali Linux - Security Audit - Professional Pentesting - Ethical Hacking - Offensive Security - Advanced Cybersecurity - Ethical Hacking - Vulnerability Analysis - Penetration Testing

Introduction

This course provides comprehensive and practical training in network auditing, penetration testing, vulnerability analysis, and offensive security, using Kali Linux as the primary platform. Students will learn to operate in real-world security assessment environments using professional techniques for reconnaissance, scanning, exploitation, traffic analysis, and post-exploitation.

Kali Linux is the industry-standard distribution for penetration testing and cybersecurity, offering hundreds of advanced tools for research, auditing, digital forensics, and red team operations. During the course, participants will work with hands-on labs, vulnerable environments, and recognized methodologies, building the skills necessary to operate as a cybersecurity technician, entry-level penetration tester, or offensive security analyst.

Addressed to

This course is geared towards:

  • Technical profiles that wish to get into pentesting, offensive security and ethical hacking.
  • System and network administrators seeking to strengthen the security of their infrastructures.
  • SOC analysts, Blue Team members, or IT professionals who want to understand offensive techniques to improve defense.
  • Cybersecurity students who require practical experience with professional methodology.
  • Candidates starting the path towards security or Linux certifications.

Training objectives

Upon completion of the training, the student will be able to:

  • Use Kali Linux as a professional environment for auditing and penetration testing.
  • Applying recognition, scanning, and enumeration techniques to network infrastructures.
  • Identify and exploit vulnerabilities in controlled environments.
  • Analyze network traffic and detect potential attack vectors.
  • Perform basic tests on wireless networks and detect weaknesses.
  • Understanding the formal methodology of a professional pentest.
  • Perform post-exploitation tasks on Linux systems.
  • Prepare professional technical reports, following best practices and standards.
  • Act in accordance with the principles of ethical hacking and within the current legal framework

Kali Linux course content: Auditing, Pentesting, Offensive Security, and Ethical Hacking

Unit 1 – Introduction

  • Course presentation and objectives
  • Prerequisites (basic Linux, networking)
  • What is Kali Linux and what is it used for?
  • Installing Kali (VMWare, VirtualBox, LiveUSB)

Unit 2 – Basic Configuration and Tools

  • Kali Linux initial setup
  • Network interface management and IP configuration
  • Essential networking tools: `ifconfig`, `ip`, `netstat`, `ss`, `nmap`, `tcpdump`, `wireshark`
  • Repositories and system updates

Unit 3 – Network Scanning and Discovery

  • Passive vs. active recognition
  • Advanced use of `nmap` (NSE scripts, custom scans)
  • Discovery of devices, services, and ports
  • Fingerprinting of operating systems and services

Unit 4 – Traffic Analysis

  • Capture and analysis with `Wireshark`
  • TCP session filters and tracking
  • Sniffing techniques with `tcpdump`, `ettercap`
  • Protocol analysis: HTTP, DNS, SMB, FTP

Unit 5 – Attacks on networks and services

  • Introduction to MITM (Man-in-the-middle)
  • ARP Spoofing and DNS Spoofing
  • Credential capture and traffic manipulation
  • Attacks on common services: SSH, FTP, Telnet, HTTP

Unit 6 – Exploitation of vulnerabilities

  • Scanning with `Nikto`, `OpenVAS`, `Metasploit`
  • Recognition of vulnerabilities in services
  • Exploiting insecure services with `Metasploit`
  • Generation of payloads and reverse shells

Unit 7 – Wireless Security

  • WiFi network monitoring and scanning
  • Cracking WPA/WPA2 keys with `aircrack-ng`
  • Deauthentication attacks
  • Handshake capture

Unit 8 – Reports and best practices

  • How to document findings
  • Generating technical reports with tools like `Dradis`
  • Professional ethics and legality of evidence
  • Defensive measures following an audit
  • Assessment and practices
  • Practical laboratories in each unit
  • Access to simulated networks or TryHackMe-type platforms

Final project: Complete audit of a simulated network

  • Delivery of technical report

Prerequisites

To fully benefit from this course, it is recommended that the participant have:

  • Interest in cybersecurity and the operation of computer systems.
  • Analytical attitude, investigative curiosity, and problem-solving skills.
  • Basic understanding of the general workings of the Internet and systems, even without in-depth knowledge.
  • Ethical commitment, understanding the importance of using the techniques learned only in authorized environments.
  • Eagerness to learn in a practical way through laboratories and exercises with simulated environments (TryHackMe, vulnerable machines, etc.).

Note: Prior experience in pentesting or using Kali Linux before is not required; the course is designed to guide the student from the fundamentals.

Other training modalities

If you are interested in taking this course in person or remotely, please contact us:

Information related to training

Soporte siempre a tu lado

Training support: Always by your side

Always by your side

Modalidades Formativas

Do you need another training modality?

Self Learning - Virtual - In-person - Telepresence

bonificaciones

Bonuses for companies

For companies