Back to catalog
SecurityIntermediate
Ethical Hacking with Kali Linux
Learn a full pentesting workflow with professional judgment. This course covers reconnaissance, enumeration, exploitation, core tools such as Kali Linux, Burp Suite, and Metasploit, plus documentation and reporting practices for real environments.
15 lessonsCertificate includedUSD 5 (~ARS 5.000)
Course syllabus
1Ethical hacking foundations
3 lessons
Ethical hacking foundations
- Legality, ethics, and scope of a pentest
- Pentesting phases: PTES methodology
- Lab setup: Kali Linux and practice environment
2Reconnaissance and enumeration
4 lessons
Reconnaissance and enumeration
- Passive reconnaissance: OSINT and footprinting
- Active reconnaissance: nmap, masscan, Shodan
- Service and version enumeration
- Attack surface analysis
3Exploitation
4 lessons
Exploitation
- Metasploit Framework: modules and payloads
- Network vulnerabilities: common exploits
- Password attacks: hydra, hashcat
- Post-exploitation: persistence and basic pivoting
4Professional reporting
3 lessons
Professional reporting
- Documenting findings and evidence
- Vulnerability classification: CVSS
- Structure of a professional pentest report
5Final project
1 lessons
Final project
- Complete pentest on a vulnerable environment (DVWA/HackTheBox)
What you will learn
Kali LinuxBurp SuiteMetasploitReconnaissanceWeb pentestingVulnerability reporting
Certificate
Ethical Hacker Certificate - CumbreAcademy
Ready to start?
Investment: USD 5 (~ARS 5.000)
Buy accessWant access to every course?
Total Access gives you this course and all the others for $20/month.
This course: USD 5 (~ARS 5.000) - Total Access: $20 USD/month (all courses)
See Total Access