• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Exploitation Techniques

Results for "exploitation techniques"


  • D

    DeepLearning.AI

    TensorFlow: Advanced Techniques

    Skills you'll gain: Generative Adversarial Networks (GANs), Autoencoders, Generative AI, Tensorflow, Computer Vision, Image Analysis, Transfer Learning, Convolutional Neural Networks, Generative Model Architectures, Fine-tuning, Deep Learning, Keras (Neural Network Library), Model Training, Model Optimization, Applied Machine Learning, Artificial Neural Networks, Classification Algorithms, Model Evaluation, Distributed Computing, Visualization (Computer Graphics)

    ★ 4.8 (1.7K) · Intermediate · Specialization · 3 - 6 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • C

    Coursera

    Apply AI Techniques & Prescriptives

    Skills you'll gain: Operations Research, Strategic Decision-Making, Decision Intelligence, Generative AI, Business Analytics, Advanced Analytics, Analytics, Process Optimization, Applied Machine Learning, Predictive Analytics, Artificial Intelligence, Decision Making, Performance Analysis, Model Evaluation

    Intermediate · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • L

    LearnKartS

    Advanced Ethical Hacking & Cybersecurity

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Vulnerability Scanning, Kubernetes, Cloud Infrastructure, Cloud Applications, Security Testing, Cyber Security Strategy, Email Security, SQL

    ★ 4.7 (51) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • I

    IBM

    Exploitation and Penetration Testing with Metasploit

    Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Human Factors (Security), Information Systems Security, Data Persistence

    ★ 4.3 (32) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • C

    Coursera

    Safe SQL Data Manipulation

    Skills you'll gain: SQL, Scalability, Data Pipelines, Data Manipulation, Data Integrity, Data Validation, Data Migration, Transaction Processing, Data Transformation, Scripting, Anomaly Detection, Record Keeping, Sampling (Statistics), Cryptography, Reconciliation

    Advanced · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    The OSINT Handbook: Mastering Open Source Intelligence

    Skills you'll gain: Threat Detection, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Operations, Cybersecurity, Interactive Data Visualization, Geospatial Information and Technology, IT Automation, Data Security, Security Awareness, Scripting, Network Analysis, Open Source Technology, Information Privacy

    Intermediate · Course · 1 - 3 Months

    Category: New
    New
    Category: Credit offered
    Credit offered
  • C

    Coursera

    Advanced Machine Learning Techniques

    Skills you'll gain: Model Optimization, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning Methods, Machine Learning Software, Model Training, Data Preprocessing, Data Processing, Hugging Face, Classification Algorithms

    Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • J

    Johns Hopkins University

    Introduction to Ethical Hacking

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Cryptography, Mobile Security, Security Testing, Vulnerability Scanning, Cyber Security Assessment, Application Security, Operating System Administration, Network Security, Key Management, Operating Systems, Encryption, Hardening

    ★ 4 (20) · Intermediate · Specialization · 3 - 6 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • J

    John Wiley & Sons

    Cybersecurity Technology and Response Strategies

    Skills you'll gain: Incident Response, Computer Security Incident Management, Security Controls, Incident Management, Business Continuity Planning, Security Management, Business Continuity, Disaster Recovery, Security Strategy, Cyber Security Strategy, Cybersecurity, Threat Management, Contingency Planning, Risk Management, Information Systems Security, Operational Risk, Risk Management Framework, Risk Analysis, Cyber Risk, Security Awareness

    Intermediate · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • E

    Edureka

    Penetration Testing and Vulnerability Scanning

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Cyber Security Assessment, Open Web Application Security Project (OWASP), Security Testing, Exploitation techniques, Application Security, Patch Management, Cyber Threat Intelligence, Cyber Engineering, Cyber Governance, Risk Management Framework, Linux Administration, Dashboard Creation, Ethical Standards And Conduct, Linux, Linux Commands, Linux Servers

    Beginner · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • E

    EDUCBA

    Sales Foundations 101: Core Techniques for Success

    Skills you'll gain: Sales Enablement, Sales Management, Sales, Oral Expression, Customer Analysis, Governance, Sales Strategy, General Sales Practices, Talent Management, Competitive Analysis, Marketing, Sales Operations, Target Market, Selling Techniques, Marketing Effectiveness, Verbal Communication Skills, Persuasive Communication, Sales Process, Overcoming Objections, Business

    ★ 4.4 (14) · Beginner · Specialization · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Pearson

    Certified Ethical Hacker (CEH): Unit 4

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Threat Detection, Penetration Testing, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security), Network Analysis

    Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
1234…452

In summary, here are 10 of our most popular exploitation techniques courses

  • TensorFlow: Advanced Techniques: DeepLearning.AI
  • Apply AI Techniques & Prescriptives: Coursera
  • Advanced Ethical Hacking & Cybersecurity: LearnKartS
  • Exploitation and Penetration Testing with Metasploit: IBM
  • Safe SQL Data Manipulation: Coursera
  • The OSINT Handbook: Mastering Open Source Intelligence: Packt
  • Advanced Machine Learning Techniques: Coursera
  • Introduction to Ethical Hacking: Johns Hopkins University
  • Cybersecurity Technology and Response Strategies: John Wiley & Sons
  • Penetration Testing and Vulnerability Scanning: Edureka

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok