• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Cyber Exploitation

Results for "cyber exploitation"


  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Advanced Cybersecurity Topics

    Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Cyber Threat Intelligence, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Intrusion Detection and Prevention, System Programming, Data Persistence, Computer Architecture

    3.9
    Rating, 3.9 out of 5 stars
    ·
    7 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Strategies for Cloud Security Risk Management

    Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, Security Management, ISO/IEC 27001, Information Privacy, NIST 800-53, Infrastructure as Code (IaC), Cyber Security Policies, Security Controls, Google Cloud Platform, Cybersecurity

    4.5
    Rating, 4.5 out of 5 stars
    ·
    72 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Detect, Respond, and Recover from Cloud Cybersecurity Attacks

    Skills you'll gain: Intrusion Detection and Prevention, Computer Security Incident Management, Cyber Threat Hunting, Cyber Attacks, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Security Controls, Threat Management, System Monitoring, IT Automation, Record Keeping, Problem Management

    3.8
    Rating, 3.8 out of 5 stars
    ·
    36 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    Universidad de los Andes

    Principios y Regulaciones de Seguridad de la Información

    Skills you'll gain: Cryptography, Security Requirements Analysis, Encryption, Data Security, Security Management, Personally Identifiable Information, Threat Management, ISO/IEC 27001, Cyber Security Policies, Information Assurance, General Data Protection Regulation (GDPR), Cybersecurity, Information Privacy, Security Awareness, Threat Detection, Cyber Risk, Human Factors, Authentications, Data Integrity, Authorization (Computing)

    4.8
    Rating, 4.8 out of 5 stars
    ·
    364 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    The Complete Ethical Hacking Course

    Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP), General Networking, Security Awareness

    4.7
    Rating, 4.7 out of 5 stars
    ·
    20 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free
    Free
    I

    Infosec

    CompTIA Security+ 701

    Skills you'll gain: Cybersecurity, Cyber Attacks, Incident Response, Information Systems Security, Application Security, Security Management, Computer Security Incident Management, Network Security, IT Security Architecture, Threat Management, Security Information and Event Management (SIEM), Cyber Threat Intelligence, Security Controls, Identity and Access Management, Cryptography, Threat Detection, Data Security, Computer Security, Encryption, Risk Management

    4.6
    Rating, 4.6 out of 5 stars
    ·
    567 reviews

    Intermediate · Course · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Identifying Security Vulnerabilities

    Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information

    4.7
    Rating, 4.7 out of 5 stars
    ·
    178 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Stages of Incident Response

    Skills you'll gain: Incident Response, Computer Security Incident Management, Threat Management, Incident Management, Disaster Recovery, Cybersecurity, Cyber Threat Hunting, Threat Detection, Event Monitoring, Digital Forensics, Business Continuity, Verification And Validation, Technical Communication

    4.6
    Rating, 4.6 out of 5 stars
    ·
    73 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    C

    Cisco Learning and Certifications

    Threat Analysis

    Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Threat Management, Exploit development, Computer Security Incident Management, Network Analysis, Cybersecurity, Network Security, Network Monitoring, SQL

    4.9
    Rating, 4.9 out of 5 stars
    ·
    34 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Governance and Strategy

    Skills you'll gain: Cyber Governance, Security Management, Incident Management, Cyber Security Strategy, Business Continuity, Disaster Recovery, Security Controls, Asset Management, Security Requirements Analysis, Risk Management, Resource Management, Compliance Auditing, Performance Metric

    4.6
    Rating, 4.6 out of 5 stars
    ·
    50 reviews

    Mixed · Course · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    D

    Duke University

    Decentralized Finance (DeFi) Opportunities and Risks

    Skills you'll gain: Blockchain, Cyber Risk, FinTech, Operational Risk, Scalability, Regulatory Compliance, Risk Management, Exploit development, Financial Regulations, Risk Analysis, Vulnerability Assessments, Secure Coding, Auditing, Governance, Key Management, Environmental Social And Corporate Governance (ESG), Transaction Processing

    4.9
    Rating, 4.9 out of 5 stars
    ·
    345 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    2

    28DIGITAL

    Web Connectivity and Security in Embedded Systems

    Skills you'll gain: Security Requirements Analysis, Network Architecture, Network Security, Internet Of Things, Cybersecurity, Web Services, Encryption, Embedded Systems, Network Protocols, Public Key Cryptography Standards (PKCS), Simple Object Access Protocol (SOAP), TCP/IP, Restful API, Information Privacy

    4.4
    Rating, 4.4 out of 5 stars
    ·
    171 reviews

    Intermediate · Course · 1 - 3 Months

1…242526…54

In summary, here are 10 of our most popular cyber exploitation courses

  • Advanced Cybersecurity Topics: Johns Hopkins University
  • Strategies for Cloud Security Risk Management: Google Cloud
  • Detect, Respond, and Recover from Cloud Cybersecurity Attacks: Google Cloud
  • Principios y Regulaciones de Seguridad de la Información: Universidad de los Andes
  • The Complete Ethical Hacking Course: Packt
  • CompTIA Security+ 701: Infosec
  • Identifying Security Vulnerabilities: University of California, Davis
  • Stages of Incident Response: Infosec
  • Threat Analysis: Cisco Learning and Certifications
  • Governance and Strategy: Infosec

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok