Exploitation techniques

Exploitation techniques are methods used to take advantage of vulnerabilities in software, networks, or systems for unauthorized access or malicious purposes. Coursera's Exploitation Techniques catalogue teaches you the fundamentals of identifying and understanding various exploit types, their classifications, and how they operate within cybersecurity contexts. You'll learn to analyze remote and local exploits, differentiate between server-side and client-side attacks, and understand advanced concepts like zero-click exploits and pivoting techniques. Mastering this skill empowers cybersecurity professionals to better protect systems, conduct ethical hacking, and develop robust defense strategies against evolving cyber threats.
11credentials
64courses

Results for "exploitation techniques"

  • Status: Preview

    Skills you'll gain: Metasploit, Penetration Testing, Exploitation techniques, Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment

  • Skills you'll gain: Penetration Testing, Cyber Security Assessment, Vulnerability Assessments, Data Security, Cybersecurity, Exploitation techniques, Test Tools, User Requirements Documents, Authorization (Computing), Technical Documentation, Computing Platforms, Requirements Analysis, Command-Line Interface, Technical Communication

  • Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Penetration Testing, Identity and Access Management, Vulnerability Assessments, Cloud Security, Amazon Elastic Compute Cloud, Cloud API, Exploitation techniques, Cyber Security Policies, Amazon S3, Scenario Testing, Command-Line Interface, Cloud Storage

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, Threat Detection, Vulnerability Assessments, Threat Modeling, IT Management, Cybersecurity, Vulnerability Management, Exploitation techniques, Cyber Security Assessment, Risk Management Framework, Cyber Attacks, Security Testing, Information Technology, Cyber Risk, Human Factors (Security), Application Servers, Web Servers, Web Applications

  • Status: Free Trial

    Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Command-Line Interface, Software Installation, Virtual Machines, SQL

  • Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Vulnerability Scanning, Application Security, Exploitation techniques, Vulnerability Assessments, Data Security, Web Applications, SQL

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, OSI Models, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Network Protocols, Network Security, Vulnerability Scanning, Cybersecurity, Prompt Engineering, Large Language Modeling, Scripting, Python Programming, SQL

  • University of Maryland, College Park

    Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Vulnerability Assessments, Application Specific Integrated Circuits, Exploit development, Cryptography, Systems Design, Encryption, Exploitation techniques, Technical Design, Emerging Technologies

  • Status: New

    Skills you'll gain: Security Testing, Cybersecurity, Network Security, TCP/IP, Network Monitoring, Vulnerability Assessments, Servers, Network Analysis, Network Protocols, Exploitation techniques, Scripting

  • Status: Free Trial

    Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Threat Hunting, Cyber Threat Intelligence, Cyber Operations, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Exploitation techniques, Malware Protection, Vulnerability Assessments, Operating Systems

  • Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Data Ethics, Virtual Machines, Linux, Technical Documentation

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • EDUCBA
  • Johns Hopkins University
  • Pearson
  • Infosec
  • University of Colorado Boulder
  • IBM
  • LearnKartS