Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Kali Linux Course Catalog
Board Infinity
Skills you'll gain: Vulnerability Assessments, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Cyber Security Assessment, Linux Commands, Cybersecurity, Linux, Network Security, Intrusion Detection and Prevention, Software Installation, Network Analysis
Skills you'll gain: Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix Shell, Query Languages, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
Skills you'll gain: Linux Commands, Bash (Scripting Language), Shell Script, File Management, Unix Shell, Linux, Unix Commands, Linux Servers, Command-Line Interface, Linux Administration, Scripting Languages, Unix, Operating Systems, Network Protocols, OS Process Management, Automation
- Status: New AI skills
Google
Skills you'll gain: Network Security, Incident Response, Computer Security Incident Management, Hardening, Stakeholder Communications, Intrusion Detection and Prevention, Security Management, Threat Management, Cybersecurity, Network Protocols, Cloud Security, Network Architecture, Event Monitoring, Cyber Risk, TCP/IP, Operating Systems, File Systems, Security Controls, Debugging, Python Programming
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
Coursera Project Network
Skills you'll gain: Linux Commands, Linux, Linux Servers, Command-Line Interface, Linux Administration, File Management, Unix Commands, File Systems, Server Administration
University of Colorado Boulder
Skills you'll gain: Agile Methodology, Scrum (Software Development), System Programming, Embedded Software, Software Testing, Embedded Systems, Linux, Software Development Methodologies, Linux Administration, Docker (Software), Git (Version Control System), Containerization, Linux Commands, Operating Systems, Sprint Planning, Shell Script, C++ (Programming Language), Debugging, File Systems, Application Deployment
Skills you'll gain: Cyber Threat Hunting, Incident Response, Identity and Access Management, Cloud Computing, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Intrusion Detection and Prevention, Network Protocols, Threat Detection, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: Linux Commands, Linux, Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Command-Line Interface, Security Testing, Scripting, Vulnerability Assessments, Scripting Languages, Intrusion Detection and Prevention, Cyber Security Assessment, General Networking, Python Programming, Network Security, Cybersecurity, Application Security, Firewall, Web Applications, Cyber Operations
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Intelligence, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Vulnerability Assessments, Encryption, Information Systems Security, Threat Management, Threat Detection
LearnQuest
Skills you'll gain: Linux, Linux Commands, Linux Servers, File Management, Command-Line Interface, Operating Systems, Web Servers, IT Automation, MySQL, Open Source Technology, Service Management
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Cybersecurity, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
In summary, here are 10 of our most popular kali linux courses
- Kali Linux:Â Board Infinity
- Tools of the Trade: Linux and SQL:Â Google
- Hands-on Introduction to Linux Commands and Shell Scripting:Â IBM
- Google Cybersecurity:Â Google
- Operating Systems: Overview, Administration, and Security:Â IBM
- Command Line in Linux:Â Coursera Project Network
- Advanced Embedded Linux Development:Â University of Colorado Boulder
- IBM Cybersecurity Analyst:Â IBM
- The Complete Ethical Hacking Bootcamp: Beginner To Advanced:Â Packt
- Cybersecurity Operations Fundamentals:Â Cisco Learning and Certifications