• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • System Exploitation

Results for "system exploitation"


  • Status: New
    New
    C

    Coursera

    Orchestrate, Analyze, and Evaluate AI Deployments

    Skills you'll gain: CI/CD, Continuous Deployment, Continuous Delivery, DevOps, Performance Analysis, Performance Metric, Performance Measurement, Artificial Intelligence, Application Performance Management, Operational Analysis, Root Cause Analysis

    Intermediate · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    E

    EDUCBA

    Data Center Security Management with Microsoft System Center

    Skills you'll gain: Incident Response, Data Centers, DevSecOps, System Monitoring, Threat Detection, Infrastructure Security, Microsoft Servers, Security Management, Payment Card Industry (PCI) Data Security Standards, Information Systems Security, Windows Servers, IT Infrastructure, Security Information and Event Management (SIEM), Disaster Recovery, IT Automation, Virtual Machines, Configuration Management

    4.9
    Rating, 4.9 out of 5 stars
    ·
    54 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Minnesota

    Enterprise Systems

    Skills you'll gain: Enterprise Resource Planning, Business Systems, Change Management, Business Technologies, Organizational Change, System Implementation, Business Process, Case Studies, Business Management, Business, Business Strategy

    4.7
    Rating, 4.7 out of 5 stars
    ·
    828 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Ethical Hacking with Kali Linux

    Skills you'll gain: Bash (Scripting Language), Network Monitoring, Exploit development, System Configuration, Digital Forensics, Virtualization

    4.8
    Rating, 4.8 out of 5 stars
    ·
    48 reviews

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    Web Hacking Expert - Full-Stack Exploitation Mastery

    Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Development, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Orchestrate, Evaluate, and Release GenAI Systems

    Skills you'll gain: Model Deployment, MLOps (Machine Learning Operations), AI Orchestration, Dependency Analysis, Application Deployment, Continuous Deployment, Generative AI, Release Management, Regression Testing, Cloud Deployment, Verification And Validation, Site Reliability Engineering, CI/CD, Model Evaluation, Continuous Delivery, Data-Driven Decision-Making, Application Performance Management, Software Technical Review, Kubernetes, System Requirements

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    IBM

    Mastering Operating Systems with IBM AIX

    Skills you'll gain: Shell Script, Job Control Language (JCL), Unix Shell, File Management, User Accounts, Operating System Administration, Unix, Package and Software Management, Systems Administration, File Systems, TCP/IP, Unix Commands, System Monitoring, Disaster Recovery, System Software, System Configuration, Operating Systems, Data Storage, Software Installation, Data Centers

    4.6
    Rating, 4.6 out of 5 stars
    ·
    24 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: New
    New
    P

    Packt

    Securing Industrial Control and Safety Instrumented Systems

    Skills you'll gain: Risk Management, Risk Management Framework, Infrastructure Security, Safety Assurance, Threat Modeling, Information Systems Security, Security Controls, Security Engineering, Security Requirements Analysis, Safety Standards, Safety and Security, Cybersecurity, Cyber Security Strategy, Continuous Monitoring, Cyber Risk, Hardening, Vulnerability Assessments, Cyber Security Policies, Cyber Security Assessment, Industrial Design

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Operating Systems: Overview, Administration, and Security

    Skills you'll gain: Operating System Administration, Cloud Computing, Linux Commands, Linux Administration, Linux Servers, Cloud Security, Operating Systems, Windows PowerShell, Windows Servers, File Systems, System Software, Mac OS, Command-Line Interface, Active Directory, Computer Systems, Virtual Machines, Firewall, Virtualization, Containerization, User Accounts

    4.6
    Rating, 4.6 out of 5 stars
    ·
    5.7K reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    L

    LearnKartS

    System & Network Security Essentials

    Skills you'll gain: Network Security, Cyber Attacks, Information Systems Security, Firewall, Malware Protection, Intrusion Detection and Prevention, Brute-force attacks, Internet Of Things, Threat Detection, Exploitation techniques, Network Protocols, Network Analysis

    4.7
    Rating, 4.7 out of 5 stars
    ·
    50 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Enterprise System Management and Security

    Skills you'll gain: Computer Security, OSI Models, Systems Administration, Virtualization, Operating System Administration, Information Technology, Enterprise Security, Cybersecurity, Network Administration, Computer Networking, Virtual Machines, Enterprise Architecture, Data Integrity

    4.7
    Rating, 4.7 out of 5 stars
    ·
    636 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    System Hacking, Malware Threats, and Network Attacks

    Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Threat Management, Brute-force attacks, Network Security, Information Systems Security, Security Awareness, Network Protocols

    4.8
    Rating, 4.8 out of 5 stars
    ·
    8 reviews

    Intermediate · Course · 1 - 3 Months

1234…497

In summary, here are 10 of our most popular system exploitation courses

  • Orchestrate, Analyze, and Evaluate AI Deployments: Coursera
  • Data Center Security Management with Microsoft System Center: EDUCBA
  • Enterprise Systems: University of Minnesota
  • Ethical Hacking with Kali Linux: IBM
  • Web Hacking Expert - Full-Stack Exploitation Mastery: Packt
  • Orchestrate, Evaluate, and Release GenAI Systems: Coursera
  • Mastering Operating Systems with IBM AIX: IBM
  • Securing Industrial Control and Safety Instrumented Systems: Packt
  • Operating Systems: Overview, Administration, and Security: IBM
  • System & Network Security Essentials: LearnKartS

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok