• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Breach Security Exploit
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Build job-relevant skills in under 2 hours with hands-on tutorials.
    Learn from top instructors with graded assignments, videos, and discussion forums.
    Learn a new tool or skill in an interactive, hands-on environment.
    Get in-depth knowledge of a subject by completing a series of courses and projects.
    Earn career credentials from industry leaders that demonstrate your expertise.
    Earn career credentials while taking courses that count towards your Master’s degree.
    Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.
    Earn a university-issued career credential in a flexible, interactive format.

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "breach (security exploit)"

    • Status: Free Trial
      Free Trial
      U

      University of Colorado Boulder

      Security & Ethical Hacking: Attacking the Network

      Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Cybersecurity, Virtual Private Networks (VPN), Network Protocols, TCP/IP, Encryption, General Networking, Computer Networking, Command-Line Interface, Network Analysis

      Build toward a degree

      4.6
      Rating, 4.6 out of 5 stars
      ·
      7 reviews

      Intermediate · Course · 1 - 3 Months

    • P

      Packt

      The Complete Pentesting and Privilege Escalation Course

      Skills you'll gain: Penetration Testing, Scenario Testing, Cybersecurity, Vulnerability Assessments, Vulnerability Scanning, Linux, Web Services, Command-Line Interface, Cryptography, File Management, Authorization (Computing), Microsoft Windows, Authentications, Shell Script, Virtual Machines

      Intermediate · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      G

      Google

      Put It to Work: Prepare for Cybersecurity Jobs

      Skills you'll gain: Incident Response, Computer Security Incident Management, Cybersecurity, Cyber Threat Intelligence, Security Management, Security Awareness, Data Ethics, Data Security, Personally Identifiable Information, Technical Communication, Artificial Intelligence

      4.8
      Rating, 4.8 out of 5 stars
      ·
      5.7K reviews

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      G

      Google

      Assets, Threats, and Vulnerabilities

      Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography

      4.8
      Rating, 4.8 out of 5 stars
      ·
      3.8K reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: New
      New
      Status: Free Trial
      Free Trial
      I

      IBM

      Ethical Hacking with Kali Linux

      Skills you'll gain: Bash (Scripting Language), Network Monitoring, System Configuration, Automation, Virtual Machines

      4.9
      Rating, 4.9 out of 5 stars
      ·
      28 reviews

      Intermediate · Course · 1 - 3 Months

    • P

      Packt

      Hands-On Web App Pentesting

      Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Web Applications, Vulnerability Scanning, Vulnerability Assessments, Cyber Security Assessment, Application Security, Web Servers, Content Management Systems, Application Programming Interface (API), Authorization (Computing), Databases

      Intermediate · Course · 1 - 4 Weeks

    • Status: New
      New
      Status: Free Trial
      Free Trial
      E

      EC-Council

      Into the Trenches: Security Operations Center

      Skills you'll gain: Incident Response, Computer Security Incident Management, Vulnerability Management, Security Information and Event Management (SIEM), Cyber Operations, Event Monitoring, Cyber Threat Hunting, Intrusion Detection and Prevention, Cyber Threat Intelligence, Enterprise Security, Threat Detection, Data Loss Prevention, Security Controls, Network Security, Network Monitoring

      Intermediate · Course · 1 - 3 Months

    • P

      Packt

      Offensive Hacking Unfolded - Become a Pro Pentester

      Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Security Testing, Security Controls, Virtual Environment, Cybersecurity, Virtual Machines, Technical Writing, Web Applications, Technical Documentation, Linux

      4
      Rating, 4 out of 5 stars
      ·
      6 reviews

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      C

      Codio

      Software Security for Web Applications

      Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Identity and Access Management, Web Applications, Authorization (Computing), Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Server Side, Vulnerability Assessments, Security Strategy

      4.9
      Rating, 4.9 out of 5 stars
      ·
      14 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      I

      IBM

      Generative AI: Boost Your Cybersecurity Career

      Skills you'll gain: Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Modeling, Generative AI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Prompt Engineering, Natural Language Processing, Anomaly Detection, Vulnerability Management, Artificial Intelligence

      4.6
      Rating, 4.6 out of 5 stars
      ·
      117 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      N

      New York University

      Introduction to Cyber Attacks

      Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Cyber Risk, Information Systems Security, Network Security, Computer Security, Malware Protection, Encryption, Data Integrity

      4.7
      Rating, 4.7 out of 5 stars
      ·
      2.9K reviews

      Beginner · Course · 1 - 4 Weeks

    • P

      Packt

      Web Hacking Expert - Full-Stack Exploitation Mastery

      Skills you'll gain: Penetration Testing, Threat Modeling, Secure Coding, Web Development, Web Applications, Full-Stack Web Development, Security Testing, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript

      Intermediate · Course · 1 - 3 Months

    1234…203

    In summary, here are 10 of our most popular breach (security exploit) courses

    • Security & Ethical Hacking: Attacking the Network: University of Colorado Boulder
    • The Complete Pentesting and Privilege Escalation Course: Packt
    • Put It to Work: Prepare for Cybersecurity Jobs: Google
    • Assets, Threats, and Vulnerabilities: Google
    • Ethical Hacking with Kali Linux: IBM
    • Hands-On Web App Pentesting: Packt
    • Into the Trenches: Security Operations Center : EC-Council
    • Offensive Hacking Unfolded - Become a Pro Pentester: Packt
    • Software Security for Web Applications: Codio
    • Generative AI: Boost Your Cybersecurity Career : IBM

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Do Not Sell/Share
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok