Exploit development

Exploit development is a critical skill in offensive cybersecurity that involves creating or modifying code to exploit security flaws in systems, services, or applications. Coursera's Exploit Development catalogue teaches you how to identify vulnerabilities, analyze root causes, and develop working exploits for various security weaknesses. You'll learn to create proof-of-concept exploits, integrate payloads, and apply stabilization and evasion techniques for common exploit types such as buffer overflows, use-after-free vulnerabilities, format string bugs, and command injections. Mastering exploit development empowers cybersecurity professionals to think like attackers, conduct advanced penetration tests, and contribute to vulnerability research, making it an essential skill for ethical hackers, red team operators, and security researchers in today's evolving threat landscape.
9credentials
22courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "exploit development"

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cyber Operations, Cyber Security Assessment, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Computer Architecture

  • Status: Free Trial

    University of California, Davis

    Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Exploit development, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Security Controls, Authentications, Security Testing, Vulnerability Management, Personally Identifiable Information

  • Status: Free Trial

    Skills you'll gain: Blockchain, Cyber Risk, FinTech, Operational Risk, Scalability, Regulatory Compliance, Legal Risk, Exploit development, Financial Regulations, Risk Analysis, Vulnerability Assessments, Secure Coding, Governance, Environmental Social And Corporate Governance (ESG)

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Metasploit, Security Testing, Exploit development, Security Strategy, Threat Modeling, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection

  • Skills you'll gain: Open Web Application Security Project (OWASP), Exploit development, Exploitation techniques, Internet Of Things, Cyber Security Assessment, Vulnerability Scanning, Vulnerability Assessments, Test Tools, USB, Embedded Systems, Network Security, Test Equipment, General Networking, Serial Peripheral Interface

  • Status: Free Trial

    Skills you'll gain: Exploit development, Penetration Testing, Technical Communication, Scripting, Technical Writing, Automation, Technical Consulting, Security Controls

  • Status: Free Trial

    Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Exploit development, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Secure Coding, Threat Modeling, Web Applications, Cloud Security, Internet Of Things