Advanced Penetration Techniques
Completed by Muhammad Izaz Haider
August 8, 2025
12 hours (approximately)
Muhammad Izaz Haider's account is verified. Coursera certifies their successful completion of Advanced Penetration Techniques
What you will learn
Exploit vulnerabilities across web, mobile, IoT, and cloud environments.
Master post-exploitation techniques, including privilege escalation and persistence.
Conduct sophisticated attacks like VLAN hopping, SSRF, and session hijacking.
Evade advanced defenses with stealthy detection avoidance strategies.
Skills you will gain
- Category: Vulnerability Assessments
- Category: Application Security
- Category: Cloud Security
- Category: Security Testing
- Category: Brute-force attacks
- Category: Network Security
- Category: Cyber Security Assessment
- Category: Intrusion Detection and Prevention
- Category: Application Programming Interface (API)
- Category: Hardening
- Category: Virtual Local Area Network (VLAN)
- Category: Exploitation techniques

