Exploitation techniques

Exploitation techniques are methods used to take advantage of vulnerabilities in software, networks, or systems for unauthorized access or malicious purposes. Coursera's Exploitation Techniques catalogue teaches you the fundamentals of identifying and understanding various exploit types, their classifications, and how they operate within cybersecurity contexts. You'll learn to analyze remote and local exploits, differentiate between server-side and client-side attacks, and understand advanced concepts like zero-click exploits and pivoting techniques. Mastering this skill empowers cybersecurity professionals to better protect systems, conduct ethical hacking, and develop robust defense strategies against evolving cyber threats.
11credentials
64courses

Results for "exploitation techniques"

  • Status: Preview

    SAE Institute México

    Skills you'll gain: Exploitation techniques, Vulnerability Scanning, Penetration Testing, Vulnerability Assessments, Cyber Operations, Cybersecurity, Information Systems Security, Network Security, Computer Networking, Network Protocols

  • Status: Free Trial

    Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Threat Hunting, Cyber Threat Intelligence, Cyber Operations, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Exploitation techniques, Malware Protection, Vulnerability Assessments, Operating Systems

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, OSI Models, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Network Protocols, Network Security, Vulnerability Scanning, Cybersecurity, Prompt Engineering, Large Language Modeling, Scripting, Python Programming, SQL

  • Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Penetration Testing, Identity and Access Management, Vulnerability Assessments, Cloud Security, Amazon Elastic Compute Cloud, Cloud API, Exploitation techniques, Cyber Security Policies, Amazon S3, Scenario Testing, Command-Line Interface, Cloud Storage

  • University of Maryland, College Park

    Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Vulnerability Assessments, Application Specific Integrated Circuits, Exploit development, Cryptography, Systems Design, Encryption, Exploitation techniques, Technical Design, Emerging Technologies

  • Status: Free Trial

    Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Lightweight Directory Access Protocols, Network Protocols

  • Status: Preview

    Skills you'll gain: Metasploit, Penetration Testing, Exploitation techniques, Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment

  • Status: New

    Skills you'll gain: Security Testing, Cybersecurity, Network Security, TCP/IP, Network Monitoring, Vulnerability Assessments, Servers, Network Analysis, Network Protocols, Exploitation techniques, Scripting

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, C (Programming Language)

  • Skills you'll gain: Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Security Assessment, Threat Modeling, Threat Detection, Intrusion Detection and Prevention, Exploitation techniques, Security Management, Network Security, Malware Protection, Network Analysis

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cyber Operations, Cyber Security Assessment, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Computer Architecture

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • EDUCBA
  • Johns Hopkins University
  • Pearson
  • Infosec
  • University of Colorado Boulder
  • IBM
  • LearnKartS