• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Cyber Exploitation

Results for "cyber exploitation"


  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Road to the CISO – Culminating Project Course

    Skills you'll gain: Cyber Governance, Cyber Security Policies, Contingency Planning, Risk Management, Cyber Security Strategy, Security Management, Enterprise Risk Management (ERM), Business Risk Management, IT Management, Cybersecurity, Governance, Cyber Risk, Information Technology, Staff Management, Organizational Leadership, Organizational Structure

    4.8
    Rating, 4.8 out of 5 stars
    ·
    36 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    L

    LearnKartS

    Ethical Hacking Practice Project & Questions

    Skills you'll gain: Security Testing, Threat Detection, Exploit development, Git (Version Control System), GitLab, GitHub, Problem Solving

    4.7
    Rating, 4.7 out of 5 stars
    ·
    65 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Security and Ethical Hacking

    Skills you'll gain: Penetration Testing, AI Security, Exploit development, Network Security, Cyber Security Assessment, Exploitation techniques, Open Web Application Security Project (OWASP), Application Security, Computer Security, Unix, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Web Applications, Server Side, Machine Learning Algorithms

    4.5
    Rating, 4.5 out of 5 stars
    ·
    13 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Strategies for Cloud Security Risk Management

    Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, Security Management, ISO/IEC 27001, Information Privacy, NIST 800-53, Infrastructure as Code (IaC), Cyber Security Policies, Security Controls, Google Cloud Platform, Cybersecurity

    4.5
    Rating, 4.5 out of 5 stars
    ·
    72 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    Universidad de los Andes

    Principios y Regulaciones de Seguridad de la Información

    Skills you'll gain: Cryptography, Security Requirements Analysis, Encryption, Data Security, Security Management, Personally Identifiable Information, Threat Management, ISO/IEC 27001, Cyber Security Policies, Information Assurance, General Data Protection Regulation (GDPR), Cybersecurity, Information Privacy, Security Awareness, Threat Detection, Cyber Risk, Human Factors, Authentications, Data Integrity, Authorization (Computing)

    4.8
    Rating, 4.8 out of 5 stars
    ·
    364 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    B

    Board Infinity

    Cybersecurity Fundamentals with Cisco Tools

    Skills you'll gain: Business Continuity Planning, Incident Response, Risk Mitigation, Cyber Threat Hunting, Risk Management Framework, Cyber Risk, Risk Management, Computer Security Incident Management, Risk Analysis, Threat Management, Cybersecurity, IT Management, Vulnerability Management, Security Management, Enterprise Risk Management (ERM), Network Security, Cyber Security Policies, Business Risk Management, Cyber Threat Intelligence, Disaster Recovery

    4.8
    Rating, 4.8 out of 5 stars
    ·
    12 reviews

    Intermediate · Specialization · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    CompTIA Cybersecurity Analyst (CySA+) CS0-003

    Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Security Management, Cyber Threat Hunting, Information Systems Security, Threat Detection, Data Security, Network Security, Cyber Security Strategy, DevSecOps, Continuous Monitoring, Malware Protection, Cloud Security, Cyber Security Assessment, Risk Management Framework, Encryption, Authentications

    4.5
    Rating, 4.5 out of 5 stars
    ·
    15 reviews

    Intermediate · Specialization · 1 - 3 Months

  • Status: Free
    Free
    I

    Infosec

    CompTIA Security+ 701

    Skills you'll gain: Cybersecurity, Cyber Attacks, Incident Response, Information Systems Security, Application Security, Security Management, Computer Security Incident Management, Network Security, IT Security Architecture, Threat Management, Security Information and Event Management (SIEM), Cyber Threat Intelligence, Security Controls, Identity and Access Management, Cryptography, Threat Detection, Data Security, Computer Security, Encryption, Risk Management

    4.6
    Rating, 4.6 out of 5 stars
    ·
    567 reviews

    Intermediate · Course · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    2

    28DIGITAL

    Web Connectivity and Security in Embedded Systems

    Skills you'll gain: Security Requirements Analysis, Network Architecture, Network Security, Internet Of Things, Cybersecurity, Web Services, Encryption, Embedded Systems, Network Protocols, Public Key Cryptography Standards (PKCS), Simple Object Access Protocol (SOAP), TCP/IP, Restful API, Information Privacy

    4.4
    Rating, 4.4 out of 5 stars
    ·
    171 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    The Complete Ethical Hacking Course

    Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP), General Networking, Security Awareness

    4.7
    Rating, 4.7 out of 5 stars
    ·
    20 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Introduction to Ethical Hacking and Recon Techniques

    Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Management, Threat Detection, Cybersecurity, Vulnerability Scanning, Cyber Attacks, Data Ethics, Vulnerability Assessments, Security Strategy, Network Security, Network Analysis

    4.8
    Rating, 4.8 out of 5 stars
    ·
    13 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    L

    LearnKartS

    Information Security Foundations

    Skills you'll gain: Threat Modeling, Cyber Threat Intelligence, Identity and Access Management

    4.6
    Rating, 4.6 out of 5 stars
    ·
    28 reviews

    Beginner · Course · 1 - 4 Weeks

1…242526…54

In summary, here are 10 of our most popular cyber exploitation courses

  • Road to the CISO – Culminating Project Course: Kennesaw State University
  • Ethical Hacking Practice Project & Questions: LearnKartS
  • Security and Ethical Hacking: University of Colorado Boulder
  • Strategies for Cloud Security Risk Management: Google Cloud
  • Principios y Regulaciones de Seguridad de la Información: Universidad de los Andes
  • Cybersecurity Fundamentals with Cisco Tools: Board Infinity
  • CompTIA Cybersecurity Analyst (CySA+) CS0-003: Pearson
  • CompTIA Security+ 701: Infosec
  • Web Connectivity and Security in Embedded Systems: 28DIGITAL
  • The Complete Ethical Hacking Course: Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok