• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Post Exploitation Techniques

Results for "post-exploitation techniques"


  • Status: New
    New
    Status: Free Trial
    Free Trial
    I

    IBM

    Exploitation and Penetration Testing with Metasploit

    Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Information Systems Security, Software Installation, Virtual Machines

    3.7
    Rating, 3.7 out of 5 stars
    ·
    14 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Preview
    Preview
    W

    Whizlabs

    Exam Prep SC-200: Microsoft Security Operations Analyst

    Skills you'll gain: MITRE ATT&CK Framework, Endpoint Security, Cyber Threat Hunting, Cyber Threat Intelligence, Endpoint Detection and Response, Cloud Security, Threat Detection, Cyber Operations, Threat Management, Microsoft Copilot, Malware Protection, Security Information and Event Management (SIEM), Microsoft Azure, Vulnerability Management, Cloud Computing, Incident Response, Computer Security Incident Management, Azure Active Directory, Hybrid Cloud Computing, Incident Management

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    The Complete Pentesting and Privilege Escalation Course

    Skills you'll gain: Penetration Testing, Exploitation techniques, Cybersecurity, Vulnerability Assessments, Vulnerability Scanning, Linux, Operating System Administration, Command-Line Interface, Linux Commands, Cryptography, File Management, Virtual Environment, Microsoft Windows, Scripting

    Intermediate · Course · 1 - 3 Months

  • I

    ISC2

    Systems and Application Security

    Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Encryption

    4.9
    Rating, 4.9 out of 5 stars
    ·
    28 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    Certified Ethical Hacker (CEH): Unit 3

    Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Malware Protection, Cyber Security Assessment, Threat Detection, Penetration Testing, Threat Management, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Applied Cryptography

    Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Application Security, Key Management, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Data Integrity, Authentications, Hardware Architecture, Emerging Technologies

    Beginner · Course · 1 - 3 Months

  • P

    Packt

    Web Hacking Expert - Full-Stack Exploitation Mastery

    Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Development, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    Nmap for Penetration Testing: From Beginner to Advanced

    Skills you'll gain: OSI Models, TCP/IP, Vulnerability Scanning, General Networking, Network Protocols, Cyber Security Assessment, Network Security, Network Administration, Vulnerability Assessments, Firewall, Network Analysis, Scripting, System Configuration

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Advanced Machine Learning Techniques

    Skills you'll gain: Data Processing

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    Intermediate Ethical Hacking Hands-on Training

    Skills you'll gain: Penetration Testing, Metasploit, Open Web Application Security Project (OWASP), Network Protocols, Vulnerability Assessments, Exploitation techniques, Windows PowerShell, Active Directory, Network Security, Network Analysis, Microsoft Windows, Wireless Networks, Scripting, Virtual Environment

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    L

    L&T EduTech

    Hydrocarbon Exploration and Production

    Skills you'll gain: Oil and Gas, Petroleum Industry, Environmental Engineering, Environmental Regulations, Energy and Utilities, Hydrology, Chemical Engineering, Engineering Analysis, Geostatistics, Water Resources, Production Process, Process Engineering, Hydraulics, Automation, Emerging Technologies, Analytical Testing

    4.7
    Rating, 4.7 out of 5 stars
    ·
    62 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    AI and Machine Learning Algorithms and Techniques

    Skills you'll gain: Unsupervised Learning, Generative AI, Large Language Modeling, Supervised Learning, Deep Learning, Applied Machine Learning, Artificial Intelligence and Machine Learning (AI/ML), Reinforcement Learning, Statistical Machine Learning, Predictive Modeling, Machine Learning Algorithms, Artificial Neural Networks, Feature Engineering, Unstructured Data, Dimensionality Reduction, Performance Metric

    4.7
    Rating, 4.7 out of 5 stars
    ·
    52 reviews

    Intermediate · Course · 1 - 3 Months

1234…411

In summary, here are 10 of our most popular post-exploitation techniques courses

  • Exploitation and Penetration Testing with Metasploit: IBM
  • Exam Prep SC-200: Microsoft Security Operations Analyst: Whizlabs
  • The Complete Pentesting and Privilege Escalation Course: Packt
  • Systems and Application Security: ISC2
  • Certified Ethical Hacker (CEH): Unit 3: Pearson
  • Cyber Security: Applied Cryptography: Macquarie University
  • Web Hacking Expert - Full-Stack Exploitation Mastery: Packt
  • Nmap for Penetration Testing: From Beginner to Advanced: Packt
  • Advanced Machine Learning Techniques: Coursera
  • Intermediate Ethical Hacking Hands-on Training: Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok