Coursera
  • All DegreesExplore Bachelor’s & Master’s degrees
  • Bachelor’s DegreesExplore master’s degrees from leading universities
  • Master’s DegreesExplore Computer Science & Engineering degrees
  • Postgraduate StudiesDeepen your expertise with postgraduate learning
  • MasterTrack™Earn credit towards a Master’s degree
  • University CertificatesAdvance your career with graduate-level learning
Find your New CareerFor EnterpriseFor Universities
  • Browse
  • Top Courses
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Pen Testing

    Filter by

    6 results for "pen testing"

    • Placeholder
      EC-Council

      Ethical Hacking Essentials (EHE)

      Skills you'll gain: Computer Networking, Network Security, Security Engineering, Cyberattacks, Operating Systems, System Security, Computer Architecture, Software Engineering, Data Management, Network Architecture, Software Security, Cloud Computing, Cloud Infrastructure, Cloud Platforms, Computer Programming, Computer Security Incident Management, Computer Security Models, Databases, Docker (Software), Finance, Internet Of Things, Mobile Development, Mobile Security, Network Model, Other Programming Languages, Regulations and Compliance, SQL, Software Testing, Statistical Programming, Supply Chain Systems, Supply Chain and Logistics

      4.7

      (51 reviews)

      Beginner · Course · 1-3 Months

    • Placeholder
      Coursera Project Network

      Write your own Python tool to footprint a web application

      Skills you'll gain: Computer Programming, Full-Stack Web Development, Python Programming, Software Architecture, Software Engineering, Statistical Programming, Theoretical Computer Science, Web Development

      4.0

      (10 reviews)

      Intermediate · Guided Project · Less Than 2 Hours

    • Placeholder
      University of Maryland, College Park

      Software Security

      Skills you'll gain: Security Engineering, Software Security

      4.6

      (1.6k reviews)

      Mixed · Course · 1-3 Months

    • Placeholder
      University of Colorado System

      Proactive Computer Security

      Skills you'll gain: Security Engineering, Computer Networking, Computer Security Incident Management, Cyberattacks, Network Security, Operating Systems, Software Engineering, Software Testing, System Security, Leadership and Management

      4.7

      (238 reviews)

      Beginner · Course · 1-3 Months

    • Placeholder
      Johns Hopkins University

      Responding, Revising and Assessing Student Writings

      Skills you'll gain: Communication, Writing

      Beginner · Course · 1-4 Weeks

    • Placeholder
      University of Maryland, College Park

      Innovation for Entrepreneurs: From Idea to Marketplace

      Skills you'll gain: Entrepreneurship, Innovation, Research and Design, Leadership and Management, Business Analysis, Customer Analysis, Market Research, Marketing, Business Design, Business Development, Customer Relationship Management, Finance, Sales, Strategy and Operations, Business Psychology, Collaboration, Communication, Design and Product, Human Resources, Market Analysis, People Development, People Management, Product Design, Product Development, Strategy

      4.6

      (652 reviews)

      Mixed · Course · 1-3 Months

    1

    In summary, here are 10 of our most popular pen testing courses

      Skills you can learn in Computer Security And Networks

      Cybersecurity (33)
      Google (25)
      Google Cloud Platform (17)
      Internet (17)
      Cryptography (16)
      Network Security (16)
      Linux (12)
      Software Testing (12)
      Information Security (10)
      Application Programming Interfaces (8)
      Kubernetes (8)
      Web (8)

      Frequently Asked Questions about Pen Testing

      • Penetration testing, commonly referred to as pen testing or “ethical hacking,” is the process of conducting a simulated cyber attack on an organization’s computer system. Pen testing is an important technique used by cybersecurity professionals for exposing database vulnerabilities and network security flaws that could be exploited by hackers. With so much of today’s critical business as well as personal information accessible through the internet, cyber attacks can be incredibly costly or even dangerous, making this process of identifying vulnerabilities essential.

        Pen tests may use a variety of methods to execute a cyber attack, including brute force attacks, SQL injection, phishing, or even hardware devices. In order to simulate real-world cyber attacks as closely as possible, a “single-blind” test is typically carried out by an outside cybersecurity or IT security analyst with no prior knowledge of the network security systems in place, and in a “double-blind” test the company’s own IT and cybersecurity team is not given advance notice. Pen testing procedures also vary depending on whether the organization wants to simulate an external attack from an outside hacker or an internal attack from a disgruntled employee.‎

      • Pen testing is an essential part of the toolkit of IT security analysts and cybersecurity consultants, who are responsible for helping companies protect their computer networks and systems against malicious cyber attacks. Unknown network security vulnerabilities can lead to incredibly costly data breaches, potentially exposing private information of an organization, its employees, and its customers, making the identification of these flaws a critically important part of cybersecurity.

        Given the elevated and increasing importance of cybersecurity today, professionals in this field are highly sought after. According to the Bureau of Labor Statistics, information security analysts earned a median annual salary of $99,730 in 2019, and these jobs are expected to grow by 31% between 2019 and 2029 - much faster than average job growth across the rest of the economy.‎

      • Certainly. Coursera offers many opportunities to learn about penetration testing and other cybersecurity topics, including individual courses and Specializations spanning multiple courses. You can learn from top-ranked schools like University of California Davis, University of Maryland College Park, University of Colorado, and the University of London, or you can take courses from IBM to earn a professional certificate in cybersecurity. Regardless of where you want to learn from, Coursera lets you view course materials and complete coursework on a flexible schedule so that you can add these important cybersecurity skills to your resume while continuing to pursue your other schoolwork or existing career.‎

      • Because penetration testing isn't a beginner-level skill, you should have a solid technical background in basic Unix commands, software development, and using Linux. Without this experience and skill set, you'll likely struggle with learning pen testing. You should also have a good foundation in the basics of coding, particularly full-stack skills, including Python, JavaScript, CSS, and HTML. Some classes may have other prerequisites, such as having an understanding of TCP/IP, networking, and/or Bash scripting.‎

      • If you have a strong drive to understand how things work and to beat hackers at their own game, then learning penetration testing might be the ideal subject for you. As a pen tester, you'll be tasked with finding and fixing vulnerabilities, including ones that were previously unknown. You'll also discover how an attack would impact a business and assess how effectively organizations are able to respond and detect attacks. If working on the front lines in the war against hackers and those who threaten cybersecurity sounds exciting, learning pen testing will get you on your way to creating a career doing just that.‎

      • Although you don't need a degree to build a career in penetration testing, gaining a formal education in computer science or computer security can help you develop some of the skills you'll need. Common undergraduate degrees for people interested in this field include information security, computer engineering, cybersecurity, and math. Some penetration testers go on to earn their master's degree in cybersecurity or a related field while others go on to work as a network or systems administrator before pursuing certification. Some of the most common certifications include the Certified Ethical Hacker or the Licensed Penetration Tester Master from the EC-Council, the Certified Expert Penetration Tester from the Information Assurance Certification Review Board, and the CompTIA Security+ credential.‎

      • Any organization within any industry can benefit from pen testing, but some of the industries most likely to hire pen testers include those that are highly regulated, like health care, banking and finance companies, and service providers. Pen testers can use their skills to test for compliance with regulations. For example, pen testers might perform an audit of a medical device company, hospital, or health care information exchange to ensure it's HIPAA-compliant. Other places rely on pen testing to reveal vulnerabilities in their websites, networks, and systems to remain more secure and enact policies to stay that way.‎

      This FAQ content has been made available for informational purposes only. Learners are advised to conduct additional research to ensure that courses and other credentials pursued meet their personal, professional, and financial goals.
      Other topics to explore
      Placeholder
      Arts and Humanities
      338 courses
      Placeholder
      Business
      1095 courses
      Placeholder
      Computer Science
      668 courses
      Placeholder
      Data Science
      425 courses
      Placeholder
      Information Technology
      145 courses
      Placeholder
      Health
      471 courses
      Placeholder
      Math and Logic
      70 courses
      Placeholder
      Personal Development
      137 courses
      Placeholder
      Physical Science and Engineering
      413 courses
      Placeholder
      Social Sciences
      401 courses
      Placeholder
      Language Learning
      150 courses

      Coursera Footer

      Learn Something New

      • Learn a Language
      • Learn Accounting
      • Learn Coding
      • Learn Copywriting
      • Learn HR
      • Learn Public Relations
      • Boulder MS Data Science
      • Illinois iMBA
      • Illinois MS Computer Science
      • UMich MS in Applied Data Science

      Popular Data Science Topics

      • Artificial Intelligence
      • Data Analysis
      • Data Engineering
      • Data Science
      • Excel
      • Machine Learning
      • Python
      • Power BI
      • R Programming
      • SQL

      Popular Computer Science & IT Topics

      • Blockchain
      • Coding
      • Computer Science
      • Cybersecurity
      • Full Stack Web Development
      • IT
      • Java
      • Software Engineering
      • Web Design
      • Web Development

      Popular Business Topics

      • Accounting
      • Business Finance
      • Communication Skills
      • Leadership & Management
      • Marketing
      • Product Management
      • Project Management
      • UX Design
      • UX Research
      • Writing

      Coursera

      • About
      • What We Offer
      • Leadership
      • Careers
      • Catalog
      • Coursera Plus
      • Professional Certificates
      • MasterTrack® Certificates
      • Degrees
      • For Enterprise
      • For Government
      • For Campus
      • Become a Partner
      • Coronavirus Response
      • Free Courses
      • All Courses

      Community

      • Learners
      • Partners
      • Beta Testers
      • Translators
      • Blog
      • Tech Blog
      • Teaching Center

      More

      • Press
      • Investors
      • Terms
      • Privacy
      • Help
      • Accessibility
      • Contact
      • Articles
      • Directory
      • Affiliates
      • Modern Slavery Statement
      Learn Anywhere
      Placeholder
      Placeholder
      Placeholder
      © 2023 Coursera Inc. All rights reserved.
      • Placeholder
      • Placeholder
      • Placeholder
      • Placeholder
      • Placeholder
      • Placeholder