User Avatar

Pentesting with Kali

Lifetime
Beginner
21 lessons
0 quizzes
3 students

Introduction to Pentesting

Step into the world of ethical hacking and cybersecurity with this hands-on introduction to penetration testing. This course is designed for beginners who want to learn how security professionals identify, exploit, and help fix vulnerabilities in systems—using industry-standard tools and techniques.

You’ll start by getting familiar with Kali Linux, the leading penetration testing operating system, and build a solid foundation in networking, Linux basics, and security concepts. From there, you’ll dive into practical labs using Metasploitable, a deliberately vulnerable machine designed for safe, legal practice, and Windows 7, exploiting MS17-010, also known as EternalBlue, both from Metasploit, and manually using PoC exploit code.

Throughout the course, you’ll learn how to:

  • Set up your own virtual pentesting lab
  • Perform information gathering and reconnaissance
  • Scan and identify vulnerabilities using tools like Nmap
  • Exploit common security flaws with Metasploit
  • Gain and maintain access to target systems
  • Understand post-exploitation techniques and basic reporting

By the end, you’ll have real, hands-on experience simulating attacks in a controlled environment—giving you the confidence to continue your journey into cybersecurity, ethical hacking, or professional pentesting.


Who this course is for

  • Beginners with an interest in cybersecurity
  • IT students or professionals wanting practical security skills
  • Anyone curious about how hacking works (ethically and legally)

Prerequisites & Tools

What You Should Know

  • Basic Python programming
  • Basic Networking

Tools You Will Master

  • Nmap
  • Nessus
  • Metasploit

Lab Environment

You will have access to:

  • Metasploitable and Windows 7 VMs

  • Attack machine (Kali Linux) preloaded with all necessary tools

  • Isolated virtual network for safe, legal practice


A Note on Ethics

This course teaches offensive techniques for one purpose: defense. Every attack demonstrated is a technique used by real adversaries. Understanding how these attacks work is the only way to effectively detect, prevent, and respond to them.

You are responsible for how you use this knowledge. Never apply these techniques against systems you do not own or have explicit written permission to test. The line between pentesting and malicious activity is authorization—and crossing it has real consequences.


What You Will Achieve

By the end of this course, you will be able to:

  • Navigate Kali Linux
  • Identify and exploit vulnerabilities in Metasploitable and Windows 7
  • Use SearchSploit to find PoC exploit code
  • Customise and execute exploit code

Whether you are an aspiring penetration tester, a system administrator looking to defend your environment, or a red team operator sharpening your skills, this course will give you the practical knowledge to .


Ready to Begin?

User Avatar

Jonathan Wallace

Jonathan Wallace is a Senior Offensive Cyber Security engineer with decades of experience in working with Information Technology across various fields. He is the senior penetration tester at Cyberforce Security and also puts a lot of effort, care and attention in to developing training courses and contributing to the Cyber security community.