Back to catalog
SecurityIntermediate

Ethical Hacking with Kali Linux

Learn a full pentesting workflow with professional judgment. This course covers reconnaissance, enumeration, exploitation, core tools such as Kali Linux, Burp Suite, and Metasploit, plus documentation and reporting practices for real environments.

15 lessonsCertificate includedUSD 5 (~ARS 5.000)

Course syllabus

1

Ethical hacking foundations

3 lessons
  • Legality, ethics, and scope of a pentest
  • Pentesting phases: PTES methodology
  • Lab setup: Kali Linux and practice environment
2

Reconnaissance and enumeration

4 lessons
  • Passive reconnaissance: OSINT and footprinting
  • Active reconnaissance: nmap, masscan, Shodan
  • Service and version enumeration
  • Attack surface analysis
3

Exploitation

4 lessons
  • Metasploit Framework: modules and payloads
  • Network vulnerabilities: common exploits
  • Password attacks: hydra, hashcat
  • Post-exploitation: persistence and basic pivoting
4

Professional reporting

3 lessons
  • Documenting findings and evidence
  • Vulnerability classification: CVSS
  • Structure of a professional pentest report
5

Final project

1 lessons
  • Complete pentest on a vulnerable environment (DVWA/HackTheBox)

What you will learn

Kali LinuxBurp SuiteMetasploitReconnaissanceWeb pentestingVulnerability reporting

Certificate

Ethical Hacker Certificate - CumbreAcademy

Ready to start?

Investment: USD 5 (~ARS 5.000)

Buy access

Want access to every course?

Total Access gives you this course and all the others for $20/month.

This course: USD 5 (~ARS 5.000) - Total Access: $20 USD/month (all courses)
See Total Access

Enroll

USD 5 (~ARS 5.000)
Buy access