• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Post Exploitation Techniques

Results for "post-exploitation techniques"


  • J

    Johns Hopkins University

    Introduction to Penetration Testing and Ethical Hacking

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cybersecurity, Cryptography, Exploitation techniques, Security Testing, Key Management, Encryption, Technical Writing, Human Factors (Security), Technical Communication

    ★ 3.9 (9) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • S

    Starweaver

    Cyber Espionage and Counterintelligence

    Skills you'll gain: Endpoint Detection and Response, Threat Detection, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Modeling, Security Information and Event Management (SIEM), Cyber Security Strategy, Exploitation techniques, Cyber Operations, Cybersecurity, Malware Protection, Cyber Attacks, Data Security, System Implementation, Open Source Technology

    Intermediate · Course · 1 - 3 Months

    Category: New
    New
    Category: Preview
    Preview
    Category: Credit offered
    Credit offered
  • P

    Packt

    Advanced Exploitation and Scripting Techniques

    Skills you'll gain: Exploit development, Penetration Testing, Exploitation techniques, Scripting, Brute-force attacks, Scripting Languages, Shell Script, Python Programming, Program Development, Network Protocols, Data Persistence, Software Installation

    ★ 4.8 (13) · Advanced · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Endpoint Detection and Response Essentials

    Skills you'll gain: Endpoint Detection and Response, Endpoint Security, Threat Detection, Malware Protection, Exploitation techniques, Cyber Security Strategy, Cybersecurity, Incident Response, IT Security Architecture, AI Integrations, AI Security, Cyber Attacks, Security Controls, Network Security, Cyber Security Assessment, Mobile Security, ChatGPT, Operating Systems

    Intermediate · Course · 1 - 3 Months

    Category: New
    New
    Category: Credit offered
    Credit offered
  • P

    Packt

    Offensive Hacking Unfolded - Become a Pro Pentester

    Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Brute-force attacks, Virtual Environment, Cybersecurity, Technical Writing, Web Servers, Linux

    ★ 4 (7) · Beginner · Course · 1 - 3 Months

    Category: Credit offered
    Credit offered
  • P

    Packt

    Advanced Penetration Techniques

    Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Exploitation techniques, Hardening, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Business Logic, Cloud Security, API Testing, Wireless Networks, Data Persistence, Application Programming Interface (API)

    Advanced · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Offensive Security Using Python

    Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), Exploit development, Threat Detection, Penetration Testing, Cloud Security, Exploitation techniques, Cyber Security Assessment, Vulnerability Scanning, Security Testing, Application Security, Cyber Operations, Incident Response, Security Engineering, CI/CD, Vulnerability Assessments, Python Programming, Web Scraping, Encryption, Automation

    Beginner · Course · 1 - 3 Months

    Category: New
    New
    Category: Preview
    Preview
    Category: Credit offered
    Credit offered
  • P

    Packt

    The Complete Pentesting and Privilege Escalation Course

    Skills you'll gain: Penetration Testing, Exploitation techniques, Scenario Testing, Cybersecurity, Vulnerability Assessments, Linux Administration, Linux Servers, Linux, Command-Line Interface, Linux Commands, Cryptography, File Management, Microsoft Windows, Unix Shell, Virtual Machines

    Intermediate · Course · 1 - 3 Months

    Category: Credit offered
    Credit offered
  • P

    Packt

    Ethical Hacking - Capture the Flag Walkthroughs - v2

    Skills you'll gain: Technical Documentation, Cybersecurity, Virtual Machines, System Configuration, Virtualization, Virtual Environment, Software Installation, Network Analysis

    Intermediate · Course · 1 - 3 Months

    Category: Credit offered
    Credit offered
  • S

    Starweaver

    Threat Hunting Techniques

    Skills you'll gain: Cyber Threat Hunting, Splunk, Threat Detection, Jupyter, Anomaly Detection, Threat Management, Cybersecurity, Data Analysis, Data Science, Data Wrangling, Applied Machine Learning, Security Information and Event Management (SIEM), Data Cleansing, Data Transformation, Data Preprocessing, MLOps (Machine Learning Operations), Unsupervised Learning, Automation

    Intermediate · Course · 1 - 3 Months

    Category: New
    New
    Category: Preview
    Preview
    Category: Credit offered
    Credit offered
  • P

    Packt

    Web Hacking Expert - Full-Stack Exploitation Mastery

    Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript

    Intermediate · Course · 1 - 3 Months

    Category: Credit offered
    Credit offered
  • C

    Coursera

    Advanced Machine Learning Techniques

    Skills you'll gain: Model Optimization, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning Methods, Machine Learning Software, Model Training, Data Preprocessing, Data Processing, Hugging Face, Classification Algorithms

    Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
1234…539

In summary, here are 10 of our most popular post-exploitation techniques courses

  • Introduction to Penetration Testing and Ethical Hacking: Johns Hopkins University
  • Cyber Espionage and Counterintelligence: Starweaver
  • Advanced Exploitation and Scripting Techniques: Packt
  • Endpoint Detection and Response Essentials: Packt
  • Offensive Hacking Unfolded - Become a Pro Pentester: Packt
  • Advanced Penetration Techniques: Packt
  • Offensive Security Using Python: Packt
  • The Complete Pentesting and Privilege Escalation Course: Packt
  • Ethical Hacking - Capture the Flag Walkthroughs - v2: Packt
  • Threat Hunting Techniques: Starweaver

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok