• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Post Exploitation Techniques

Results for "post-exploitation techniques"


  • I

    IBM

    IBM Ethical Hacking with Open Source Tools

    Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Network Monitoring, Bash (Scripting Language), Cyber Security Assessment, Network Security, Anomaly Detection, Incident Management, AI Security, Information Systems Security, Network Analysis

    ★ 4.6 (191) · Intermediate · Professional Certificate · 3 - 6 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • S

    Starweaver

    Advanced Threat Intelligence Techniques

    Skills you'll gain: Cyber Threat Intelligence, Intelligence Collection and Analysis, Cyber Threat Hunting, MITRE ATT&CK Framework, Threat Modeling, Threat Detection, Threat Management, AI Security, Responsible AI, Malware Protection, Cybersecurity, Requirements Analysis, Technical Communication

    Intermediate · Course · 1 - 4 Weeks

    Category: New
    New
    Category: Preview
    Preview
    Category: Credit offered
    Credit offered
  • I

    IBM

    Penetration Testing, Threat Hunting, and Cryptography

    Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Brute-force attacks, Vulnerability Assessments, AI Integrations, Exploitation techniques, Test Planning

    ★ 4.6 (2.5K) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • J

    John Wiley & Sons

    Cybersecurity Technology and Response Strategies

    Skills you'll gain: Incident Response, Computer Security Incident Management, Security Controls, Incident Management, Business Continuity Planning, Security Management, Business Continuity, Disaster Recovery, Security Strategy, Cyber Security Strategy, Cybersecurity, Threat Management, Contingency Planning, Risk Management, Information Systems Security, Operational Risk, Risk Management Framework, Risk Analysis, Cyber Risk, Security Awareness

    Intermediate · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • C

    Coursera

    Safe SQL Data Manipulation

    Skills you'll gain: SQL, Scalability, Data Pipelines, Data Manipulation, Data Integrity, Data Validation, Data Migration, Transaction Processing, Data Transformation, Scripting, Anomaly Detection, Record Keeping, Sampling (Statistics), Cryptography, Reconciliation

    Advanced · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • L

    L&T EduTech

    Mechanization in Construction

    Skills you'll gain: Accident Prevention, Safety Standards, Safety Training, Construction, Maintenance, Repair, and Facility Services, Hazard Analysis, Emergency Response, Hydraulics, Construction Engineering, Facility Repair And Maintenance, General Construction and Construction Labor, Equipment Design, Waste Minimization, Sustainable Engineering, Grading (Landscape), Civil Engineering, Personal protective equipment, Construction Management, Construction Estimating, Structural Engineering

    ★ 4.6 (19) · Advanced · Specialization · 3 - 6 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered

What brings you to Coursera today?

  • P

    Pearson

    Practical Cybersecurity Fundamentals: Unit 3

    Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Scanning, Security Testing, Cybersecurity, Vulnerability Assessments, Network Security, Web Applications, SQL

    Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • J

    Johns Hopkins University

    Advanced Cybersecurity Techniques

    Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Exploitation techniques, Mobile Security, Vulnerability Scanning, Cybersecurity, Security Testing, Application Security, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Network Protocols

    Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • L

    LearnKartS

    Advanced Ethical Hacking & Cybersecurity

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Vulnerability Scanning, Kubernetes, Cloud Infrastructure, Cloud Applications, Security Testing, Cyber Security Strategy, Email Security, SQL

    ★ 4.7 (51) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Hands-On Web App Pentesting

    Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Web Applications, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Security Testing, Application Security, Test Tools, Web Servers, Content Management Systems, Application Programming Interface (API), Databases

    ★ 4.6 (8) · Intermediate · Course · 1 - 4 Weeks

    Category: Credit offered
    Credit offered
  • L

    LearnQuest

    Generative AI for Penetration Testing: Red Team

    Skills you'll gain: Penetration Testing, Metasploit, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cyber Threat Intelligence, Generative AI, Security Testing, Responsible AI, AI Integrations

    Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • I

    IBM

    Exploitation and Penetration Testing with Metasploit

    Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Human Factors (Security), Information Systems Security, Data Persistence

    ★ 4.3 (32) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
1234…539

In summary, here are 10 of our most popular post-exploitation techniques courses

  • IBM Ethical Hacking with Open Source Tools: IBM
  • Advanced Threat Intelligence Techniques: Starweaver
  • Penetration Testing, Threat Hunting, and Cryptography: IBM
  • Cybersecurity Technology and Response Strategies: John Wiley & Sons
  • Safe SQL Data Manipulation: Coursera
  • Mechanization in Construction: L&T EduTech
  • Practical Cybersecurity Fundamentals: Unit 3: Pearson
  • Advanced Cybersecurity Techniques: Johns Hopkins University
  • Advanced Ethical Hacking & Cybersecurity: LearnKartS
  • Hands-On Web App Pentesting: Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok