Exploitation techniques

Exploitation techniques are methods used to take advantage of vulnerabilities in software, networks, or systems for unauthorized access or malicious purposes. Coursera's Exploitation Techniques catalogue teaches you the fundamentals of identifying and understanding various exploit types, their classifications, and how they operate within cybersecurity contexts. You'll learn to analyze remote and local exploits, differentiate between server-side and client-side attacks, and understand advanced concepts like zero-click exploits and pivoting techniques. Mastering this skill empowers cybersecurity professionals to better protect systems, conduct ethical hacking, and develop robust defense strategies against evolving cyber threats.
12credentials
62courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Get in-depth knowledge of a subject by completing a series of courses and projects.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "exploitation techniques"

  • Status: New
    Status: Free Trial

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Security Testing, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Cryptography, Cybersecurity, Vulnerability Scanning, Hardening, Threat Detection, Data Import/Export, Public Key Infrastructure, MySQL, Linux, Linux Administration

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Exploitation techniques, Security Testing, Vulnerability Assessments, Wireless Networks, Network Security, Linux Commands, Microsoft Windows, Cryptography, Operating Systems

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Malware Protection, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Threat Detection, Email Security, Vulnerability Assessments, Human Factors (Security), Network Analysis

  • Status: New
    Status: Free Trial

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Cyber Security Assessment, Network Security, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis, Microsoft Windows

  • Status: Free Trial

    Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Open Web Application Security Project (OWASP), Vulnerability Assessments, Exploitation techniques, Test Planning

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Mobile Security, Cyber Operations, Scripting, Android (Operating System), Command-Line Interface, Authentications, Network Analysis, Automation, Virtual Environment

What brings you to Coursera today?

  • Status: New
    Status: Free Trial

    Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, Public Key Infrastructure, MySQL, Vulnerability Scanning, Encryption, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL, PostgreSQL, Command-Line Interface

  • Status: New
    Status: Preview

    Skills you'll gain: MITRE ATT&CK Framework, Cyber Operations, Threat Modeling, Cyber Security Strategy, Cyber Threat Intelligence, Penetration Testing, Cybersecurity, Exploitation techniques, Threat Detection, Vulnerability Assessments, Human Factors (Security), Security Awareness, Security Testing, Network Security, Generative AI

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, Exploitation techniques, Scripting, Scripting Languages, Python Programming, Cyber Operations, Object Oriented Programming (OOP), Network Security, Network Protocols, Debugging

  • Status: Free Trial

    Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Scripting, Vulnerability Assessments, General Networking, Scripting Languages, Cyber Security Assessment, Python Programming, Web Applications, Cybersecurity, Data Ethics, Firewall, Network Security, Computer Networking

  • Status: New
    Status: Free Trial

    Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Cyber Attacks, Wireless Networks, Application Security, Network Monitoring, Linux, Object Oriented Programming (OOP), Vulnerability Assessments, Cyber Security Assessment, Intrusion Detection and Prevention

  • Status: Free Trial

    Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • EDUCBA
  • Johns Hopkins University
  • Pearson
  • Infosec
  • University of Colorado Boulder
  • IBM
  • Universidad de los Andes