• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Privilege Escalation Techniques
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "privilege escalation techniques"

    • Status: New
      New
      Status: Free Trial
      Free Trial
      P

      Pearson

      Certified Ethical Hacker (CEH): Unit 4

      Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Cyber Threat Intelligence, Penetration Testing, Vulnerability Assessments, Firewall, Security Awareness, Human Factors (Security), Network Analysis

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      E

      ESSEC Business School

      Negotiation, Mediation, and Conflict Resolution - Capstone Project

      Skills you'll gain: Mediation, Negotiation, Conflict Management, Intercultural Competence, Contract Negotiation, Cultural Diversity, Communication Strategies, Analysis, Value Propositions, Consultative Approaches, Process Design, Interpersonal Communications, Rapport Building, Active Listening

      4.8
      Rating, 4.8 out of 5 stars
      ·
      263 reviews

      Intermediate · Course · 1 - 3 Months

    • Status: New
      New
      Status: Free Trial
      Free Trial
      P

      Pearson

      Certified Ethical Hacker (CEH): Unit 3

      Skills you'll gain: Vulnerability Assessments, Malware Protection, Threat Detection, Penetration Testing, Threat Management, Cybersecurity, Infrastructure Security, Network Security, Information Systems Security

      Intermediate · Course · 1 - 4 Weeks

    • I

      ISC2

      Systems and Application Security

      Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Human Factors (Security), Encryption

      4.9
      Rating, 4.9 out of 5 stars
      ·
      26 reviews

      Beginner · Course · 1 - 4 Weeks

    • P

      Packt

      Delegation Skills

      Skills you'll gain: Delegation Skills, Productivity, Supervision, Team Leadership, Team Management, Leadership, Leadership Development, Overcoming Obstacles, Empowerment, Expectation Management, Constructive Feedback

      Intermediate · Course · 1 - 4 Weeks

    • P

      Packt

      Offensive Hacking Unfolded - Become a Pro Pentester

      Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Security Testing, Security Controls, Virtual Environment, Cybersecurity, Virtual Machines, Technical Writing, Web Applications, Technical Documentation, Linux

      4
      Rating, 4 out of 5 stars
      ·
      6 reviews

      Beginner · Course · 1 - 3 Months

    • P

      Packt

      Pentesting Fundamentals for Beginners

      Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Vulnerability Assessments, Security Testing, Vulnerability Management, Open Web Application Security Project (OWASP), Cyber Security Assessment, Test Tools, Virtual Machines, Technical Documentation, Microsoft Windows, System Configuration, Command-Line Interface, Software Installation, Scripting

      Intermediate · Course · 3 - 6 Months

    • P

      Packt

      Handling Difficult Conversations

      Skills you'll gain: Conflict Management, Assertiveness, Leadership, Professional Development, Leadership and Management, Interpersonal Communications, De-escalation Techniques, Emotional Intelligence, People Management, Verbal Communication Skills, Communication, Empathy

      5
      Rating, 5 out of 5 stars
      ·
      7 reviews

      Beginner · Course · 1 - 4 Weeks

    • P

      Packt

      Hands-On Web App Pentesting

      Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Web Applications, Vulnerability Scanning, Vulnerability Assessments, Cyber Security Assessment, Application Security, Web Servers, Content Management Systems, Application Programming Interface (API), Authorization (Computing), Databases

      Intermediate · Course · 1 - 4 Weeks

    • I

      ISC2

      Security Concepts and Practices

      Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Configuration Management, Data Ethics, Data Integrity, Identity and Access Management

      4.7
      Rating, 4.7 out of 5 stars
      ·
      92 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: New
      New
      Status: Free Trial
      Free Trial
      P

      Packt

      Ethical Hacking Foundations & Network Security

      Skills you'll gain: Penetration Testing, Network Security, Wireless Networks, Cybersecurity, Linux, Vulnerability Assessments, Intrusion Detection and Prevention, Command-Line Interface, Linux Commands, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Security Software, Software Installation, File Management, Virtual Machines

      4.7
      Rating, 4.7 out of 5 stars
      ·
      7 reviews

      Beginner · Course · 1 - 3 Months

    • Status: New
      New
      P

      Packt

      Practical Cyber Hacking Skills for Beginners

      Skills you'll gain: Cybersecurity, Cyber Security Assessment, Incident Response, Cyber Attacks, Firewall, Computer Security Incident Management, Vulnerability Scanning, Application Security, Network Protocols, Vulnerability Assessments, Cryptography, Malware Protection, Virtualization and Virtual Machines, Authentications, Command-Line Interface, Linux Commands, Network Analysis

      Beginner · Course · 1 - 3 Months

    1234…282

    In summary, here are 10 of our most popular privilege escalation techniques courses

    • Certified Ethical Hacker (CEH): Unit 4: Pearson
    • Negotiation, Mediation, and Conflict Resolution - Capstone Project: ESSEC Business School
    • Certified Ethical Hacker (CEH): Unit 3: Pearson
    • Systems and Application Security: ISC2
    • Delegation Skills: Packt
    • Offensive Hacking Unfolded - Become a Pro Pentester: Packt
    • Pentesting Fundamentals for Beginners: Packt
    • Handling Difficult Conversations: Packt
    • Hands-On Web App Pentesting: Packt
    • Security Concepts and Practices: ISC2

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Do Not Sell/Share
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok