Penetration Testing

Penetration Testing, also known as ethical hacking, is a practice of testing a computer system, network, or application to find security vulnerabilities that an attacker could exploit. Coursera's Penetration Testing catalogue equips you with the knowledge to identify, analyze, and address potential weaknesses in cybersecurity infrastructure. You'll learn about the leading methodologies and best practices in penetration testing, including network scanning, vulnerability scanning, system hacking, web application hacking, and social engineering. You'll also master the art of documenting, reporting, and providing recommendations to mitigate risks. As a learner, you'll gain hands-on experience in using various penetration testing tools and technologies, strengthening your cybersecurity skills and readiness for a career in cybersecurity.
30credentials
84courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "penetration testing"

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, Threat Detection, Vulnerability Assessments, Threat Modeling, IT Management, Cybersecurity, Vulnerability Management, Exploitation techniques, Cyber Security Assessment, Risk Management Framework, Cyber Attacks, Security Testing, Information Technology, Cyber Risk, Human Factors (Security), Application Servers, Web Servers, Web Applications

  • Status: New
    Status: Free Trial

    Skills you'll gain: Business Risk Management, Risk Management, Cyber Governance, Penetration Testing, Personally Identifiable Information, Information Privacy, Vendor Management, Governance Risk Management and Compliance, Security Management, Cyber Risk, Vulnerability Assessments, Cyber Security Policies, Security Strategy, Compliance Management, Cybersecurity, Regulatory Requirements, Security Controls, Security Awareness

  • Status: Preview

    Skills you'll gain: Application Security, Secure Coding, Data Ethics, Vulnerability Assessments, Responsible AI, Threat Modeling, Data Security, Security Controls, Cybersecurity, Artificial Intelligence, Threat Detection, Authorization (Computing), Encryption, Penetration Testing

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Metasploit, Security Testing, Exploit development, Security Strategy, Threat Modeling, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, IT Security Architecture, Secure Coding, Application Security, Security Testing, Security Strategy, Security Requirements Analysis, Solution Architecture, Software Development Methodologies, Software Development Life Cycle, Systems Architecture, Penetration Testing, Business Risk Management, Compliance Management

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, Cloud Security, Internet Of Things, Infrastructure Security, Vulnerability Management, Information Systems Security, Incident Response, Identity and Access Management, Security Engineering, Threat Management, Penetration Testing, Network Security, Security Controls, Cloud Computing, Cloud Computing Architecture, Threat Detection, Authentications, Authorization (Computing)

  • Status: Free Trial

    Skills you'll gain: Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cybersecurity, Information Systems Security, Local Area Networks, Firewall, Windows PowerShell, Hardening, Threat Detection, Linux, Penetration Testing, Network Architecture, Wireless Networks, Vulnerability Assessments, System Configuration, IT Automation, Encryption, Network Analysis, Public Key Infrastructure

  • Status: Free Trial

    Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Linux, Linux Administration, Network Security, Authorization (Computing), User Accounts, Network Monitoring, System Monitoring, Hardening, Continuous Monitoring, Information Systems Security, Security Controls, Wireless Networks, Penetration Testing, Cybersecurity, Threat Detection, Containerization, File Management, Incident Response

  • Status: Preview

    Skills you'll gain: Metasploit, Penetration Testing, Exploitation techniques, Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment

  • Status: New
    Status: Free Trial

    Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Encryption, Cloud Security, Web Applications, Internet Of Things, Cloud Computing, Network Architecture

  • Status: New
    Status: Free Trial

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Threat Detection, Data Encryption Standard, Threat Modeling, Cryptography, Cyber Attacks, Data Security, Databases, Malware Protection, Penetration Testing, Vulnerability Assessments, Application Security, Security Engineering, Authentications, Data Structures, Data Integrity, Artificial Intelligence, SQL

  • Skills you'll gain: General Networking, TCP/IP, Network Security, Penetration Testing, Wireless Networks, Exploitation techniques, Linux, Vulnerability Scanning, Linux Commands, Encryption, Network Analysis, Command-Line Interface, Virtual Machines

Related roles

Gain the knowledge and skills you need to advance.

  • This role has a $119,168 median salary ¹.

    description:

    A Cyber Security Specialist monitors systems, responds to incidents, enforces policies, and protects data from unauthorized access and cyber threats.

    This role has a $119,168 median salary ¹.

    Offered by

    IBM_logo
    ISC2_logo
  • This role has a $116,480 median salary ¹.

    description:

    A Cyber Security Analyst monitors IT systems, analyzes threats, finds vulnerabilities, and implements measures to protect data from cyber attacks.

    This role has a $116,480 median salary ¹.

    Offered by

    Google_logo
    Microsoft_logo
    IBM_logo

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • EDUCBA
  • Pearson
  • IBM
  • Infosec
  • LearnQuest
  • LearnKartS
  • EC-Council