• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Exploitation Techniques

Results for "exploitation techniques"


  • C

    Coursera

    Apply AI Techniques & Prescriptives

    Skills you'll gain: Operations Research, Strategic Decision-Making, Decision Intelligence, Generative AI, Business Analytics, Advanced Analytics, Analytics, Process Optimization, Applied Machine Learning, Predictive Analytics, Artificial Intelligence, Decision Making, Performance Analysis, Model Evaluation

    Intermediate · Course · 1 - 4 Weeks

  • P

    Pearson

    Certified Ethical Hacker (CEH): Unit 3

    Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Vulnerability Management, Malware Protection, Threat Detection, Penetration Testing, Threat Management, Cybersecurity, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security

    Intermediate · Course · 1 - 4 Weeks

  • J

    Johns Hopkins University

    Advanced Neural Network Techniques

    Skills you'll gain: Autoencoders, Recurrent Neural Networks (RNNs), Deep Learning, Artificial Neural Networks, Reinforcement Learning, Generative AI, Generative Adversarial Networks (GANs), Generative Model Architectures, Unsupervised Learning, Responsible AI, Data Ethics, Markov Model

    ★ 4 (7) · Intermediate · Course · 1 - 3 Months

  • P

    Packt

    Intermediate Ethical Hacking Techniques

    Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Exploit development, Vulnerability Scanning, Exploitation techniques, Security Testing, Vulnerability Assessments, Hardening, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL

    ★ 3.8 (9) · Intermediate · Course · 1 - 4 Weeks

  • U

    University of California, Davis

    Exploiting and Securing Vulnerabilities in Java Applications

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Security Strategy, Vulnerability Scanning, Security Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Exploitation techniques, Java, Security Controls, Java Programming, Patch Management, Dependency Analysis, Docker (Software)

    ★ 4.4 (67) · Intermediate · Course · 1 - 4 Weeks

  • J

    Johns Hopkins University

    Advanced Cybersecurity Topics

    Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Security Assessment, Cybersecurity, Operating System Administration, Operating Systems, Hardening, Computer Security, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Identity and Access Management, Memory Management, Data Persistence, Computer Architecture

    ★ 4.1 (9) · Intermediate · Course · 1 - 3 Months

  • I

    Infosec

    Execution, persistence, privilege escalation and evasion

    Skills you'll gain: Cybersecurity, Cyber Operations, Data Persistence, Exploitation techniques, Persistence, Intrusion Detection and Prevention, Scripting, Python Programming, Scripting Languages

    ★ 4.6 (98) · Intermediate · Course · 1 - 4 Weeks

  • P

    Pearson

    Certified Ethical Hacker (CEH): Unit 5

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Web Applications, Penetration Testing, Application Security, Security Controls, Security Testing, Vulnerability Assessments, Application Programming Interface (API), Exploitation techniques, Web Servers, Cloud Security

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Exploit Development, Malware, & Defensive Strategies

    Skills you'll gain: Exploit development, Penetration Testing, Cyber Operations, Malware Protection, Exploitation techniques, Network Monitoring, Object Oriented Programming (OOP), Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting Languages, Scripting, Remote Access Systems, Python Programming, Program Development, Command-Line Interface, Code Reusability, Package and Software Management

    ★ 5 (9) · Advanced · Course · 1 - 3 Months

  • E

    EDUCBA

    Python Hacking: Apply, Implement & Analyze

    Skills you'll gain: Encryption, Cybersecurity, Cryptography, File I/O, Python Programming, Programming Principles, Debugging, Data Mapping, Software Testing, Data Structures

    ★ 4.8 (13) · Mixed · Course · 1 - 4 Weeks

  • E

    EDUCBA

    Advanced Penetration Testing with Kali Linux

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Security Testing, Mobile Security, Test Script Development, Scripting, Android (Operating System), Human Factors (Security), Scripting Languages, Authentications, Network Analysis, Automation, Virtual Networking, Virtual Environment

    ★ 4.8 (14) · Mixed · Course · 1 - 4 Weeks

  • I

    Infosec

    Memory, Encryption, and Protecting Data in Android

    Skills you'll gain: Cryptography, Encryption, Android Development, Key Management, Exploit development, Android (Operating System), Secure Coding, Mobile Security, Data Security, Application Security, Data Loss Prevention, Network Security, Exploitation techniques, Memory Management, File Systems

    Mixed · Course · 1 - 4 Weeks

1…678…478

In summary, here are 10 of our most popular exploitation techniques courses

  • Apply AI Techniques & Prescriptives: Coursera
  • Certified Ethical Hacker (CEH): Unit 3: Pearson
  • Advanced Neural Network Techniques: Johns Hopkins University
  • Intermediate Ethical Hacking Techniques: Packt
  • Exploiting and Securing Vulnerabilities in Java Applications: University of California, Davis
  • Advanced Cybersecurity Topics: Johns Hopkins University
  • Execution, persistence, privilege escalation and evasion: Infosec
  • Certified Ethical Hacker (CEH): Unit 5: Pearson
  • Exploit Development, Malware, & Defensive Strategies: Packt
  • Python Hacking: Apply, Implement & Analyze: EDUCBA

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications
  • Share your Coursera learning story

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Udemy

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok