Exploitation techniques

Exploitation techniques are methods used to take advantage of vulnerabilities in software, networks, or systems for unauthorized access or malicious purposes. Coursera's Exploitation Techniques catalogue teaches you the fundamentals of identifying and understanding various exploit types, their classifications, and how they operate within cybersecurity contexts. You'll learn to analyze remote and local exploits, differentiate between server-side and client-side attacks, and understand advanced concepts like zero-click exploits and pivoting techniques. Mastering this skill empowers cybersecurity professionals to better protect systems, conduct ethical hacking, and develop robust defense strategies against evolving cyber threats.
11credentials
64courses

Results for "exploitation techniques"

  • Status: New
    Status: Free Trial

    University of Colorado Boulder

    Skills you'll gain: Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Vulnerability Assessments, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Responsible AI, Network Routing, Infrastructure Security, Application Security, Information Systems Security

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Scanning, Cybersecurity, Vulnerability Assessments, Network Security, Open Web Application Security Project (OWASP), SQL

  • Skills you'll gain: Cybersecurity, Penetration Testing, Cyber Attacks, Threat Detection, Cyber Security Assessment, Network Security, Intrusion Detection and Prevention, Application Security, Security Awareness, Exploitation techniques, Vulnerability Assessments, Web Servers

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, Intrusion Detection and Prevention, Application Security, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Local Area Network (VLAN), Cloud Security, Wireless Networks, Application Programming Interface (API)

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Cyber Security Assessment, Cybersecurity, Information Systems Security Assessment Framework (ISSAF), Cyber Security Strategy, Vulnerability Assessments, Cyber Threat Intelligence, Threat Modeling, Exploitation techniques, Cyber Security Policies, Computer Security, Security Controls, Data Security

  • Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Virtual Machines, Technical Documentation, Microsoft Windows, Windows PowerShell, Linux Commands, Command-Line Interface, Software Installation

  • Skills you'll gain: General Networking, TCP/IP, Network Security, Penetration Testing, Wireless Networks, Exploitation techniques, Linux, Vulnerability Scanning, Linux Commands, Encryption, Network Analysis, Command-Line Interface, Virtual Machines

  • Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Web Applications, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cyber Security Assessment, Application Security, Web Servers, Content Management Systems, Application Programming Interface (API), Databases

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Metasploit, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cyber Security Assessment, Cyber Threat Intelligence, Generative AI, Cyber Operations, Data Ethics, Prompt Engineering, Automation

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, Network Security, Vulnerability Scanning, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Vulnerability Assessments, Information Systems Security, Command-Line Interface, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Software Installation, File Management, Virtual Machines

  • Status: New

    Skills you'll gain: Non-Verbal Communication, Exploitation techniques, Human Factors (Security), Investigation, Data Collection, Security Awareness, Persuasive Communication, Social Sciences, Cybersecurity, Rapport Building, Email Security

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • EDUCBA
  • Johns Hopkins University
  • Pearson
  • Infosec
  • University of Colorado Boulder
  • IBM
  • LearnKartS