• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Lambda Exploitation

Results for "lambda exploitation"


  • Status: Free Trial
    Free Trial
    I

    IBM

    Penetration Testing, Threat Hunting, and Cryptography

    Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, AI Security, Vulnerability Assessments, Exploitation techniques, Test Planning

    4.6
    Rating, 4.6 out of 5 stars
    ·
    2.5K reviews

    Intermediate · Course · 1 - 3 Months

  • A

    Amazon Web Services

    Python for Serverless Applications and Automation on AWS

    Skills you'll gain: Software Architecture, Amazon Web Services, Amazon DynamoDB, Python Programming, Service Oriented Architecture, Cloud Computing Architecture, Microservices, Serverless Computing, Cloud Applications, Application Programming Interface (API), Databases, Scripting, Programming Principles, Automation, Relational Databases, Application Development, Development Environment

    4.4
    Rating, 4.4 out of 5 stars
    ·
    20 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    S

    Scrimba

    Learn Python

    Skills you'll gain: Object Oriented Programming (OOP), File I/O, Data Structures, Python Programming, Programming Principles, User Interface (UI), Computer Programming, Scripting, Software Engineering, Performance Tuning, Scripting Languages, Web Development, Computational Thinking, Debugging, Random Forest Algorithm, Software Development, Web Development Tools

    4.7
    Rating, 4.7 out of 5 stars
    ·
    52 reviews

    Beginner · Specialization · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    C

    Copenhagen Business School

    Social Entrepreneurship

    Skills you'll gain: Social Impact, Growth Strategies, Team Oriented, Marketing Communications, Business Modeling, Business Planning, Sustainable Development, Organizational Structure, Entrepreneurship, Market Opportunities, Communication Strategies, Business Strategy, Strategic Partnership, Community Development, Sustainable Business, Performance Measurement, Fundraising, Entrepreneurial Finance, Needs Assessment, Team Building

    4.6
    Rating, 4.6 out of 5 stars
    ·
    407 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Exploitation and Penetration Testing with Metasploit

    Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Information Systems Security, Data Persistence, Virtual Machines

    3.9
    Rating, 3.9 out of 5 stars
    ·
    17 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    CertNexus

    CyberSec First Responder – Advanced (CFR-A): Attack

    Skills you'll gain: Metasploit, Exploit development, Exploitation techniques, Vulnerability, Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, System Configuration, Data Security, Cybersecurity, Cyber Attacks, Linux, Bash (Scripting Language), Proxy Servers, Scripting, Linux Commands, Scripting Languages, Python Programming

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Fundamentals of Computer Network Security

    Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques, Software Design Patterns

    4
    Rating, 4 out of 5 stars
    ·
    589 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Advanced Exploitation and Scripting Techniques

    Skills you'll gain: Exploitation techniques, Scripting, Brute-force attacks, Python Programming, Command-Line Interface, Program Development, Network Protocols, TCP/IP, Data Persistence, Debugging

    4.8
    Rating, 4.8 out of 5 stars
    ·
    12 reviews

    Advanced · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Complete Modern C++ (C++11/14/17)

    Skills you'll gain: C and C++, C++ (Programming Language), Object Oriented Programming (OOP), File I/O, Computer Programming, Microsoft Visual Studio, System Programming, Apple Xcode, Development Environment, Algorithms, File Systems, Software Design Patterns, Data Structures, Performance Tuning, Debugging, File Management

    4.5
    Rating, 4.5 out of 5 stars
    ·
    22 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Preview
    Preview
    C

    Coursera

    AWS Data Automation: Glue & Lambda Integration

    Skills you'll gain: Data Integration, Extract, Transform, Load, Metadata Management, Amazon Redshift, Amazon Web Services, Data Pipelines, Data Warehousing, Amazon S3, Automation, Cloud-Native Computing, Data Transformation, Serverless Computing, Process Optimization, System Monitoring

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    E

    EC-Council

    Ethical Hacking Essentials (EHE)

    Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Vulnerability Scanning, Cybersecurity, Cyber Attacks, Brute-force attacks, Exploitation techniques, Application Security, Human Factors (Security), Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks

    4.6
    Rating, 4.6 out of 5 stars
    ·
    602 reviews

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Preview
    Preview
    U

    University of Maryland, College Park

    Cybersecurity: Overlooked Threats to Your Strategy

    Skills you'll gain: Cyber Security Strategy, Cybersecurity, Threat Modeling, Threat Management, Cyber Risk, Cyber Attacks, Security Awareness, Cyber Security Policies, Computer Security, Malware Protection, Information Systems Security, Infrastructure Security, Public Safety and National Security, Human Factors (Security), Data Security, Risk Management

    Beginner · Course · 1 - 3 Months

1234…22

In summary, here are 10 of our most popular lambda exploitation courses

  • Penetration Testing, Threat Hunting, and Cryptography: IBM
  • Python for Serverless Applications and Automation on AWS: Amazon Web Services
  • Learn Python: Scrimba
  • Social Entrepreneurship: Copenhagen Business School
  • Exploitation and Penetration Testing with Metasploit: IBM
  • CyberSec First Responder – Advanced (CFR-A): Attack: CertNexus
  • Fundamentals of Computer Network Security: University of Colorado System
  • Advanced Exploitation and Scripting Techniques: Packt
  • Complete Modern C++ (C++11/14/17): Packt
  • AWS Data Automation: Glue & Lambda Integration: Coursera

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok