FC-02

Linux from your first terminal to pentesting tools. Bash scripts, Nmap, Wireshark, Burp Suite and Metasploit from scratch. No prior knowledge required.

50 lessons10 modulesIntermediate3 themes

Why Linux is a must-have

Numbers that explain everything

90%+of hacker attacks are launched from Linux systems
600+tools in Kali Linux out of the box
$3–7Kpentester salary per month (junior–middle)
15 minto scan an entire subnet with Masscan

After the course you will be able to

Not theory — concrete tools and skills you can demonstrate in an interview

🐧Set up Kali Linux from scratch and deploy your own lab
📝Write a Bash script to automate pentester tasks
🔍Scan a network with Nmap and find vulnerable services
📡Intercept and analyze HTTP traffic in Wireshark
🕸️Set up Burp Suite and intercept your first request to a website
💥Launch an exploit via Metasploit and get a Meterpreter session
🔑Connect via SSH with keys and create a secure tunnel
🎯Conduct a full pentest of a vulnerable machine from recon to exploitation

Real attacks in the course

Every tool in the course is analyzed through real incidents

Real case2014

Shellshock — 500 million servers at risk

A vulnerability in Bash allowed arbitrary code execution via environment variables. The exploit was a single line in the terminal and affected web servers, routers and IoT worldwide.

Lesson 17 · Bash and environment variables
Real case2017

WannaCry — $4B in damages in 4 days

The worm used the EternalBlue exploit (implemented in Metasploit) to attack via SMB. 200,000 systems in 150 countries infected in 4 days. Stopped with a single sinkhole command in Kali Linux.

Lesson 47 · Metasploit in practice
Success story2017

Marcus Hutchins — stopped WannaCry with one command

A 22-year-old researcher from the UK found the kill-switch in WannaCry's code using reverse engineering. Registered one domain and stopped the global epidemic in minutes.

Lesson 50 · Final project

Course Program

10 modules · 50 lessons · 3 themes: Linux from first launch, Command line & automation, Pentester's arsenal

Where this course leads

FC-02 — an essential foundation for most careers in cybersecurity

$3,000 — $7,000/mo

Pentester

Conduct authorized penetration tests. FC-02 gives you the full toolkit to start your career.

Kali LinuxMetasploitNmapBurp Suite
Track:FC-02 → FC-03 → FC-05
$2,500 — $5,000/mo

DevSecOps Engineer

Integrate security into CI/CD pipelines. Linux and scripting are the foundation of the profession.

BashDockerLinuxCI/CD Security
Track:FC-02 → FC-08 → FC-06
$500 — $∞/finding

Bug Bounty Hunter

Find vulnerabilities legally and get rewarded. Tools from FC-02 are industry standard.

NmapBurp SuiteOSINTBash scripting
Track:FC-02 → FC-03 → MC-01/02

Who this course is for

🔰

After FC-01

Completed cybersecurity fundamentals and ready to master real pentesting tools

🖥️

System administrators

Want to understand how your systems are attacked and learn to test their security yourself

👨‍💻

Developers

Want to add practical security skills to your resume and transition into AppSec or DevSecOps

Master the tools
of a real hacker
from lesson one

50 lessons with Kali Linux, Nmap, Wireshark, Burp Suite and Metasploit. Practice on real vulnerable machines.

FC-02● Available

Linux & Hacker Tools

Level: beginner to intermediate

50 lessons
video + practice
45 hours
of content
10 modules
by topic
3 themes
Linux → CLI → Pentest
Kali Linux lab from scratch
Nmap, Wireshark, Burp Suite in practice
Metasploit and your first exploit
Final project: machine pentest