• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Cyber Exploitation

Results for "cyber exploitation"


  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    AI for Cybersecurity

    Skills you'll gain: Generative Adversarial Networks (GANs), Anomaly Detection, AI Security, Generative AI, Fraud detection, Intrusion Detection and Prevention, Model Evaluation, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Cyber Security Strategy, Applied Machine Learning, Email Security, Network Security, Jupyter

    4.3
    Rating, 4.3 out of 5 stars
    ·
    103 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    Cyber Espionage and Counterintelligence

    Skills you'll gain: Endpoint Detection and Response, Threat Detection, MITRE ATT&CK Framework, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Modeling, Security Information and Event Management (SIEM), Cyber Security Strategy, Cyber Operations, Cybersecurity, Malware Protection, Incident Response, Data Loss Prevention, Anomaly Detection, Data Security, System Implementation, Open Source Technology

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Leadership

    Skills you'll gain: Security Awareness, Human Factors (Security), Cyber Attacks, Cyber Risk, Mobile Security, Cyber Security Strategy, Cyber Governance, Data Ethics, User Experience Design, Cyber Security Policies, Cyber Security Assessment, Security Management, Cybersecurity, Cyber Operations, Organizational Leadership, Strategic Leadership, Team Leadership, Leadership and Management, Leadership, Leadership Development

    4.7
    Rating, 4.7 out of 5 stars
    ·
    24 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    U

    University of London

    Cyber Security – Technology and Governance

    Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, IT Security Architecture, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks

    4.8
    Rating, 4.8 out of 5 stars
    ·
    190 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Exploitation and Penetration Testing with Metasploit

    Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Information Systems Security, Data Persistence, Virtual Machines

    3.9
    Rating, 3.9 out of 5 stars
    ·
    17 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Cybersecurity Architecture

    Skills you'll gain: Network Security, Cybersecurity, Application Security, Data Security

    4.8
    Rating, 4.8 out of 5 stars
    ·
    181 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Cyber Threats and Network Security Foundations

    Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Threat Modeling, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, Cyber Attacks, Hardening, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Cyber Incident Response

    Skills you'll gain: Incident Response, Computer Security Incident Management, Threat Management, Cyber Operations, Incident Management, Cybersecurity, Disaster Recovery, Cyber Threat Hunting, Intrusion Detection and Prevention, Security Management, Cyber Threat Intelligence, Digital Forensics, Threat Detection, Cyber Attacks, Cyber Security Assessment, Event Monitoring, Network Security, Data Security, Business Continuity, Analysis

    4.7
    Rating, 4.7 out of 5 stars
    ·
    268 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Essentials

    Skills you'll gain: Security Awareness, Cyber Attacks, Cyber Risk, Mobile Security, Cybersecurity, Cyber Security Strategy, Cyber Governance, Malware Protection, Cyber Security Policies, Cyber Security Assessment, Cyber Threat Intelligence, Data Security, Cyber Threat Hunting, Human Factors (Security), Email Security, Identity and Access Management, Security Management, Security Strategy, Multi-Factor Authentication, Cloud Security

    4.6
    Rating, 4.6 out of 5 stars
    ·
    18 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    R

    Royal Holloway, University of London

    Cybercrime

    Skills you'll gain: Human Factors (Security), Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Security Awareness, Social Sciences, Exploitation techniques, Culture, Psychology, Survey Creation, Research

    4.8
    Rating, 4.8 out of 5 stars
    ·
    106 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Applied Cryptography

    Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Data Storage Technologies, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Authentications, Hardware Architecture, Emerging Technologies

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Security of AI

    Skills you'll gain: AI Security, Responsible AI, Cyber Security Strategy, Cyber Attacks, Cyber Threat Intelligence, Cybersecurity, Data Security, DevSecOps, Security Engineering, Artificial Intelligence, Threat Modeling, Cyber Governance, Artificial Intelligence and Machine Learning (AI/ML), Risk Management, Encryption, Application Programming Interface (API), Machine Learning, Governance, Regulation and Legal Compliance, Applied Machine Learning

    4.5
    Rating, 4.5 out of 5 stars
    ·
    11 reviews

    Beginner · Course · 1 - 3 Months

1234…54

In summary, here are 10 of our most popular cyber exploitation courses

  • AI for Cybersecurity: Johns Hopkins University
  • Cyber Espionage and Counterintelligence: Starweaver
  • Cyber Security: Leadership: Macquarie University
  • Cyber Security – Technology and Governance: University of London
  • Exploitation and Penetration Testing with Metasploit: IBM
  • Cybersecurity Architecture: IBM
  • Cyber Threats and Network Security Foundations: Edureka
  • Cyber Incident Response: Infosec
  • Cyber Security: Essentials: Macquarie University
  • Cybercrime: Royal Holloway, University of London

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok