{"id":823,"date":"2026-04-10T22:52:51","date_gmt":"2026-04-10T22:52:51","guid":{"rendered":"https:\/\/cyberforcesecurity.org\/courses\/?post_type=lp_course&#038;p=823"},"modified":"2026-04-12T04:56:40","modified_gmt":"2026-04-12T04:56:40","slug":"introduction-to-pentesting-with-kali-linux","status":"publish","type":"lp_course","link":"https:\/\/cyberforcesecurity.org\/courses\/course\/introduction-to-pentesting-with-kali-linux\/","title":{"rendered":"Pentesting with Kali"},"content":{"rendered":"<div class=\"flex max-w-full flex-col gap-4 grow\">\n<div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal outline-none keyboard-focused:focus-ring [.text-message+&amp;]:mt-1\" dir=\"auto\" tabindex=\"0\" data-message-author-role=\"assistant\" data-message-id=\"ffb27f94-bf40-4e27-bcae-d327b23a2b4a\" data-message-model-slug=\"gpt-5-3\" data-turn-start-message=\"true\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden\">\n<div class=\"markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling\">\n<h1 data-start=\"110\" data-end=\"410\">Introduction to Pentesting<\/h1>\n<p data-start=\"110\" data-end=\"410\">Step into the world of ethical hacking and cybersecurity with this hands-on introduction to penetration testing. This course is designed for beginners who want to learn how security professionals identify, exploit, and help fix vulnerabilities in systems\u2014using industry-standard tools and techniques.<\/p>\n<p data-start=\"110\" data-end=\"410\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-919 alignleft\" src=\"https:\/\/cyberforcesecurity.org\/courses\/wp-content\/uploads\/2026\/04\/vsftpd-1024x491.png\" alt=\"\" width=\"1024\" height=\"491\" srcset=\"https:\/\/cyberforcesecurity.org\/courses\/wp-content\/uploads\/2026\/04\/vsftpd-1024x491.png 1024w, https:\/\/cyberforcesecurity.org\/courses\/wp-content\/uploads\/2026\/04\/vsftpd-300x144.png 300w, https:\/\/cyberforcesecurity.org\/courses\/wp-content\/uploads\/2026\/04\/vsftpd-768x368.png 768w, https:\/\/cyberforcesecurity.org\/courses\/wp-content\/uploads\/2026\/04\/vsftpd-1536x737.png 1536w, https:\/\/cyberforcesecurity.org\/courses\/wp-content\/uploads\/2026\/04\/vsftpd.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<\/div>\n<div class=\"markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling\">\n<p data-start=\"412\" data-end=\"735\">You\u2019ll start by getting familiar with <strong data-start=\"450\" data-end=\"464\">Kali Linux<\/strong>, the leading penetration testing operating system, and build a solid foundation in networking, Linux basics, and security concepts. From there, you\u2019ll dive into practical labs using <strong data-start=\"647\" data-end=\"665\">Metasploitable<\/strong>, a deliberately vulnerable machine designed for safe, legal practice, and <strong>Windows 7<\/strong>, exploiting <strong>MS17-010<\/strong>, also known as <strong>EternalBlue<\/strong>, both from <strong>Metasploit<\/strong>, and <strong>manually<\/strong> using PoC exploit code.<\/p>\n<p data-start=\"737\" data-end=\"780\">Throughout the course, you\u2019ll learn how to:<\/p>\n<ul data-start=\"781\" data-end=\"1097\">\n<li data-section-id=\"1mjuyi3\" data-start=\"781\" data-end=\"823\">Set up your own virtual pentesting lab<\/li>\n<li data-section-id=\"1ewta3t\" data-start=\"824\" data-end=\"876\">Perform information gathering and reconnaissance<\/li>\n<li data-section-id=\"1obknlq\" data-start=\"877\" data-end=\"936\">Scan and identify vulnerabilities using tools like Nmap<\/li>\n<li data-section-id=\"lx2t59\" data-start=\"937\" data-end=\"986\">Exploit common security flaws with Metasploit<\/li>\n<li data-section-id=\"1rz8k4j\" data-start=\"987\" data-end=\"1033\">Gain and maintain access to target systems<\/li>\n<li data-section-id=\"1ahrmtj\" data-start=\"1034\" data-end=\"1097\">Understand post-exploitation techniques and basic reporting<\/li>\n<\/ul>\n<p data-start=\"1099\" data-end=\"1311\">By the end, you\u2019ll have real, hands-on experience simulating attacks in a controlled environment\u2014giving you the confidence to continue your journey into cybersecurity, ethical hacking, or professional pentesting.<\/p>\n<hr \/>\n<h3 data-start=\"1313\" data-end=\"1340\">Who this course is for<\/h3>\n<ul data-start=\"1341\" data-end=\"1520\">\n<li data-section-id=\"u6fbk\" data-start=\"1341\" data-end=\"1388\">Beginners with an interest in cybersecurity<\/li>\n<li data-section-id=\"1bfksxt\" data-start=\"1389\" data-end=\"1455\">IT students or professionals wanting practical security skills<\/li>\n<li data-section-id=\"1oi752f\" data-start=\"1456\" data-end=\"1520\">Anyone curious about how hacking works (ethically and legally)<\/li>\n<\/ul>\n<hr \/>\n<h2>Prerequisites &amp; Tools<\/h2>\n<h3>What You Should Know<\/h3>\n<ul>\n<li>Basic Python programming<\/li>\n<li>Basic Networking<\/li>\n<\/ul>\n<h3>Tools You Will Master<\/h3>\n<ul>\n<li>Nmap<\/li>\n<li>Nessus<\/li>\n<li>Metasploit<\/li>\n<\/ul>\n<h3>Lab Environment<\/h3>\n<p class=\"ds-markdown-paragraph\">You will have access to:<\/p>\n<ul>\n<li>\n<p class=\"ds-markdown-paragraph\">Metasploitable and Windows 7 VMs<\/p>\n<\/li>\n<li>\n<p class=\"ds-markdown-paragraph\">Attack machine (Kali Linux) preloaded with all necessary tools<\/p>\n<\/li>\n<li>\n<p class=\"ds-markdown-paragraph\">Isolated virtual network for safe, legal practice<\/p>\n<\/li>\n<\/ul>\n<hr \/>\n<h2>A Note on Ethics<\/h2>\n<p class=\"ds-markdown-paragraph\">This course teaches offensive techniques for one purpose: <strong>defense<\/strong>. Every attack demonstrated is a technique used by real adversaries. Understanding how these attacks work is the only way to effectively detect, prevent, and respond to them.<\/p>\n<p class=\"ds-markdown-paragraph\"><strong>You are responsible for how you use this knowledge.<\/strong> Never apply these techniques against systems you do not own or have explicit written permission to test. The line between pentesting and malicious activity is authorization\u2014and crossing it has real consequences.<\/p>\n<hr \/>\n<h2>What You Will Achieve<\/h2>\n<p class=\"ds-markdown-paragraph\">By the end of this course, you will be able to:<\/p>\n<ul>\n<li><strong>Navigate<\/strong> Kali Linux<\/li>\n<li><strong>Identify and exploit<\/strong> vulnerabilities in Metasploitable and Windows 7<\/li>\n<li><strong>Use SearchSploit<\/strong> to find PoC exploit code<\/li>\n<li><strong>Customise and execute<\/strong> exploit code<\/li>\n<\/ul>\n<p class=\"ds-markdown-paragraph\">Whether you are an aspiring penetration tester, a system administrator looking to defend your environment, or a red team operator sharpening your skills, this course will give you the practical knowledge to .<\/p>\n<hr \/>\n<h2>Ready to Begin?<\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to Pentesting Step into the world of ethical hacking and cybersecurity with this hands-on introduction to penetration testing. This&hellip;<\/p>\n","protected":false},"author":1,"featured_media":824,"comment_status":"closed","ping_status":"closed","template":"","course_category":[2],"course_tag":[],"class_list":["post-823","lp_course","type-lp_course","status-publish","has-post-thumbnail","hentry","course_category-training","course"],"_links":{"self":[{"href":"https:\/\/cyberforcesecurity.org\/courses\/wp-json\/wp\/v2\/lp_course\/823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforcesecurity.org\/courses\/wp-json\/wp\/v2\/lp_course"}],"about":[{"href":"https:\/\/cyberforcesecurity.org\/courses\/wp-json\/wp\/v2\/types\/lp_course"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforcesecurity.org\/courses\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforcesecurity.org\/courses\/wp-json\/wp\/v2\/comments?post=823"}],"version-history":[{"count":22,"href":"https:\/\/cyberforcesecurity.org\/courses\/wp-json\/wp\/v2\/lp_course\/823\/revisions"}],"predecessor-version":[{"id":1008,"href":"https:\/\/cyberforcesecurity.org\/courses\/wp-json\/wp\/v2\/lp_course\/823\/revisions\/1008"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberforcesecurity.org\/courses\/wp-json\/wp\/v2\/media\/824"}],"wp:attachment":[{"href":"https:\/\/cyberforcesecurity.org\/courses\/wp-json\/wp\/v2\/media?parent=823"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/cyberforcesecurity.org\/courses\/wp-json\/wp\/v2\/course_category?post=823"},{"taxonomy":"course_tag","embeddable":true,"href":"https:\/\/cyberforcesecurity.org\/courses\/wp-json\/wp\/v2\/course_tag?post=823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}