Linux from your first terminal to pentesting tools. Bash scripts, Nmap, Wireshark, Burp Suite and Metasploit from scratch. No prior knowledge required.
Why Linux is a must-have
Numbers that explain everything
After the course you will be able to
Not theory — concrete tools and skills you can demonstrate in an interview
Real attacks in the course
Every tool in the course is analyzed through real incidents
Shellshock — 500 million servers at risk
A vulnerability in Bash allowed arbitrary code execution via environment variables. The exploit was a single line in the terminal and affected web servers, routers and IoT worldwide.
WannaCry — $4B in damages in 4 days
The worm used the EternalBlue exploit (implemented in Metasploit) to attack via SMB. 200,000 systems in 150 countries infected in 4 days. Stopped with a single sinkhole command in Kali Linux.
Marcus Hutchins — stopped WannaCry with one command
A 22-year-old researcher from the UK found the kill-switch in WannaCry's code using reverse engineering. Registered one domain and stopped the global epidemic in minutes.
Course Program
10 modules · 50 lessons · 3 themes: Linux from first launch, Command line & automation, Pentester's arsenal
Where this course leads
FC-02 — an essential foundation for most careers in cybersecurity
Pentester
Conduct authorized penetration tests. FC-02 gives you the full toolkit to start your career.
DevSecOps Engineer
Integrate security into CI/CD pipelines. Linux and scripting are the foundation of the profession.
Bug Bounty Hunter
Find vulnerabilities legally and get rewarded. Tools from FC-02 are industry standard.
Who this course is for
After FC-01
Completed cybersecurity fundamentals and ready to master real pentesting tools
System administrators
Want to understand how your systems are attacked and learn to test their security yourself
Developers
Want to add practical security skills to your resume and transition into AppSec or DevSecOps
Master the tools
of a real hacker
from lesson one
50 lessons with Kali Linux, Nmap, Wireshark, Burp Suite and Metasploit. Practice on real vulnerable machines.
Linux & Hacker Tools
Level: beginner to intermediate

