Best Free Kali Linux Courses

Find the best online Free Kali Linux Courses for you. The courses are sorted based on popularity and user ratings. We do not allow paid placements in any of our rankings.

Start Kali Linux, Ethical Hacking and Penetration Testing!

Learn the basics of ethical hacking, penetration testing, web testing and wifi hacking in kali linux!

Created by Ermin Kreponic - IT Expert

"]

Students: 290470, Price: Free

You will get to see screen capture live tutorials showing you everything you need to do to get started with ethical hacking and penetration testing including information about all of the topics below!

Learn the basics of what ethical hacking and penetration testing is to decide whether you want to go to an advanced level! Get a full tutorial on how to install VirtualBox o including on Windows 8.1 and gain the ability to run Kali Linux in any environment. See what to do to create the virtual environment and learn the basics of the Linux terminal.

Continue through the course to learn how to stay anonymous with tor and use Virtual Private Networks (VPN). Follow this information with an introduction to the ethical hacking and penetration testing tools you can use to take your learning from beginner to advanced! See how to change a mac address with macchanger. Discover how to use aircrack for wifi hacking, learn about proxychains, and finish with denial of service attacks.

Take this course now to get your learning started fast as an IT security professional online!

Fundamentals of Computer Hacking

Everyone can become a hacker provided they learn it from the basics and build a solid foundation. Start with this course

Created by infySEC Global - Head - Cyber Security Research

"]

Students: 197275, Price: Free

This Course is the fundamental course on Ethical Hacking which delivers knowledge of real time attack vectors and defensive methods. This course has been designed by group of globally recognized Information Security Professionals to meet the participant and organization expectations. For easy understanding for the participants , LIVE practical demonstration on the appropriate full fledged courses.

This course delivers comprehensive deep understanding of how attacker’s works in dark and methodology they follow to deface a network. In other hand, how the Information Security Professionals working in an organization identifies these methodologies and deface attackers.

This course will give a idea to know how our other full courses will be like.

Intro to Linux Shell Scripting (Free course)

Get up to speed with Linux shell scripting quickly

Created by Jason Cannon - Professional system administrator, consultant, and author.

"]

Students: 89311, Price: Free

In this mini-course, you'll learn the essentials of writing your own Linux shell scripts, including:

  • How to avoid the most common mistakes made by inexperienced shell scripters.
  • Understanding and using best practices and standard conventions. (If you don't follow these guidelines you'll look like a rank amateur.)
  • A simple technique that can make amazingly complex scripts easy to write.

I've used shell scripts to save myself countless hours of tedious work.  More importantly, having the ability to write shell scripts has helped me enormously in my career.

Not only did I get to take on some very interesting projects because I had the ability to shell script, I was also able to jump right to the front of the line when it came time for promotions.

I want that same thing for you, too!

Even if you're not interested in furthering your career, you can write shell scripts that organize your vacation photos, track your stock portfolio, and more...

I can't wait to see what shell scripts you create!

Jason

Make in-house Hacking & Pentesting lab

Build your "Hacking" lab on your own laptop / computer to improve your skills

Created by Atul Tiwari - Ethical hacker | Security Evangelist | Penetration Tester

"]

Students: 24758, Price: Free

Why do you need a pentest lab ? Simple! If you aspire to be a pentester, or want to improve your skills, in-house pentest labs are one of the best way to practice! This course is for same that gives you hands on knowledge about Building your own virtual penetration testing labs on virtual machine for Penetration testing, Web application security analysis, Web app pen-testing, Network security.

It also gives you techniques for Firewall Evasion, IDS bypassing, WAF Evasion techniques.

It best suites for people who is keen to make testing with their own and only one computer. it doesn't require too much knowledge to set it up. 

Just you need to have understanding of computer and basic computing skills to start with. 

This course is highly focused towards practical from scratch to advanced level towards penetration testing on virtual machine.

This course is very helpful for newcomers in ethical hacking and penetration testing field.

In this course, you also get where to start penetration testing and ethical hacking knowledge.

OWASP ZAP From Scratch

Stop compromising your system and switch from using pirated Burpsuite tool to Zed Attack Proxy tool

Created by Darshit Varotaria - Founder and CEO at Krydence Technologies LLP

"]

Students: 12672, Price: Free

Welcome to this short and quick introductory course. OWASP ZAP is popular security and proxy tool maintained by international community.  This course is mean to be helpful while switching from using pirated Burpsuite tool by teaching alternatives for all features that are daily used by pentesters.

This tool contains all the features similar to Burpsuite like Repeater, Intruder, Scanning for possible vulnerabilities, Spider, Scanning and even more. The only changes are the titles. So, you just get to use with such titles and you are done with it.

This course does not mean to deface or damage Burpsuite fame. The aim is to help community who are using pirated Burpsuite tool and leads to compromise their system security.

WSL 2, Docker, Kali Linux and Windows Terminal – get started

Leverage the power of the Windows Subsystem for Linux (WSL 2), Docker, Kali Linux and Windows Terminal on Win10

Created by David Bombal - CCIE #11023, over 15 years of network training experience

"]

Students: 11304, Price: Free

Get started quickly with Windows Subsystem for Linux (WSL2) today! Learn how to spin up Docker containers on your computer and use the fantastic new Windows Terminal. I have also added a Kali Linux video to show you how to get Kali working with WSL 2.

Microsoft now ships Windows 10 with a Linux Kernel! Amazing to see how Microsoft have changed in recent years. No longer do they hate Linux, but they have now embraced it. You can learn Linux, Docker and other technologies easily using WSL 2.

WARNING: There are still issues running WSL 2 with VMware Workstation and VirtualBox. Don't use WSL 2 if you needed nested virtualization with those hypervisors. Hopefully this will be resolved soon.

This course focuses on the following:

- WSL 2

- Docker using WSL 2

- Windows Terminal

- Visual Studio Code (Vs code)

- Kali Linux installation

I don't try to teach you everything about Linux, Docker or Windows. I'm only showing you how you can leverage these technologies to do amazing things. This course consists of practical demonstrations which you can follow - the best way to learn is hands-on learning, so follow me and set this up yourself.

Introduction to Dark Web, Anonymity and Cryptocurrency

Learn to access Dark Web, Tor Browser and know about Bitcoin cryptocurrency.

Created by Rajneesh Gupta - Cyber Security Practitioner and Instructor

"]

Students: 6433, Price: Free

The dark web is a decentralized network of internet sites that try to make users as anonymous as possible by routing all their communications through multiple servers and encrypting it at every step.

Given the dark web’s widespread use by people who don’t want their activities known to the authorities, you might be surprised to hear that it was conceived and prototyped by researchers at the U.S. Naval Research Lab, scientists who’d already recognized that the open internet was extremely susceptible to surveillance.

Building on their work, the Tor Network went live in 2002, making the dark web widely available for the first time. Six years later, the Tor Project released the Tor Browser, designed to make the dark web somewhat easier to navigate – though, as CSO Magazine noted recently, it can still be “unpredictable, unreliable and maddeningly slow.” Tor says its network now includes several thousand servers and millions of users, though it’s hard to tell whether its user base is continuing to grow.

In this course, you'll learn to get started with Dark Web, Tor Browser and Cryptocurrency.

Section 1. Introduction to DarkWeb: In this, you'll learn about Onion network and dark web in detail.

Section 2. Tor Browser: In this section, you'll learn to install Tor Browser and proxychains in multiple platforms such as Windows, Mac OS and Kali linux.

Section 3. Accessing Dark Web: In this section, we'll learn to access Dark Web search engine, markets and Bitcoin Cryptocurrency.

Basic Security Testing with OpenVAS and Penetration Testing

Learn Installation of OpenVAS/GVM Basic - Security Testing and Penetration Hacking

Created by Rajneesh Gupta - Cyber Security Practitioner and Instructor

"]

Students: 4503, Price: Free

OpenVAS/GVM is a fully-featured vulnerability scanner, but it’s also one component of the larger “Greenbone Security Manager” (GSM).

OpenVAS dates back to 2009 and the project is maintained by a commercial/open-source company. With its focus on the enterprise market and its long history, any risks of enterprises adopting a technology that might become abandoned are greatly reduced.

Here are some notable positives of OpenVAS/GVM:

  • Has a long history (since 2009) with daily updates and over 50,000 vulnerability tests

  • Is backed by an enterprise software-security company

  • Can perform various types of authenticated/unauthenticated tests

  • Supports a variety of high- and low-level Internet and industrial protocols

  • Has an internal programming language that can be used for implementing custom vulnerability tests

Vulnerability scanning is one of the foundations of standard enterprise security. An enterprise with a good security posture will have: a firewall, some type of asset-mapping, a vulnerability scanner and possibly even a security team that does some type of pentesting. Keep in mind that the list above is not exhaustive, but the rudimentary outline of an enterprise with a few good security measures in place.

Vulnerability scanners, in particular, are critical for ensuring that any threats that may have made it past the firewall are picked up before they can infect and destroy entire networks.

The enterprise/proprietary vulnerability scanner market is filled with competitors (such as QualysGuard or Nessus), and while some companies prefer running proprietary enterprise scanners, there are also many companies that prefer using collective intelligence and open source scanners.

One such product is OpenVAS (now renamed Greenbone Vulnerability Management or GVM). In this post we’ll refer to OpenVAS/GVM interchangeably, as the old name is still used to identify the software.

Ethical Hacking – Kali Linux Fundamentals

Understanding the basic of Kali 2021

Created by Arthur Salmon - Skilled Cyber & Networking Instructor

"]

Students: 4361, Price: Free

Welcome this course is a basic overview of Kali Linux 2021. We cover basic setup, terminal navigation, and some core operating system structure. This is a great course if you haven't really used Kali Linux at all and you want to get your feet wet. Remember that this is a basic overview of Kali Linux core functions. There are three main sections. The first is focused on why this course exists. The second section is on Linux basics including the file system, boot process, and terminal navigation and manipulation. The third section is on Linux administration and understanding users, permissions, groups, and understand permission at a deeper level. I do cover basics on checking services in the third section also. There is a single video in the fourth section that is about crafting a basic exploitable EXE and setting up a handler to perform someone first meterpreter shell.

Because this is an overview there is not a lot of practical examples, however I do have assignments that ask you to accomplish some tasks so that you can see how to accomplish certain things. These assignments are made to build retention and understanding of what was being covered in the course. Thank you

Web Application Penetration Testing with Nessus Scanner

Learn Web Application Penetration Testing and Ethical Hacking with Nessus Scanner

Created by Rajneesh Gupta - Cyber Security Practitioner and Instructor

"]

Students: 3016, Price: Free

Welcome to this Web Application Penetration Testing with Nessus Scanner ! This course will be highly practical but also be covering theory in the beginning. This course is extremely helpful for security engineers or security consultant who want to perform vulnerability scanning for their organizations or customers.

From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaboration and product innovation to provide the most accurate and complete vulnerability data - so you don't miss critical issues which could put your organization at risk.

Today, Nessus is trusted by more than 30,000 organizations worldwide as one of the most widely deployed security technologies on the planet - and the gold standard for vulnerability assessment

Launching Scan: Here you'll learn to launch different scans such as host discovery, network scan, credential scan, malware scan and wannacry ransomware scan.

Advance Web Application Test: In this, students will learn to launch an advance web application scanning such as Advance Scan, Advance dynamic scan, Web Application Test for known vulnerabilities, Web application Test for All vulnerabilities(Quick) and Web application Test for All vulnerabilities(Complex).