This course starts with the introduction, followed by the required software installations. You will learn about network and web scanning, deep scanning, deep scanning phases, hacking systems, different attacks and malwares. You will aslo learn about Hijacking, Hacking Servers, Hacking Websites and ...SQL Injection.
Later in the course we will also discuss about how to use Kali Linux for ethical hacking. You will have different practicals on usinf Kali Linux such as for information gathering, vulnerability analysis, web application analysis, database assessment and password attacks, which will make you understand better and have some hands-on experience.
You can find here the full syllabus of course: Kali Linux