• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Cyber Exploitation

Results for "cyber exploitation"


  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    Practical Cybersecurity Fundamentals

    Skills you'll gain: AI Security, MITRE ATT&CK Framework, Penetration Testing, Incident Response, Cyber Threat Hunting, Cybersecurity, Cyber Threat Intelligence, DevSecOps, Digital Forensics, Cloud Security, Patch Management, Cyber Security Assessment, Exploitation techniques, Network Security, Computer Security Incident Management, Business Continuity, Cryptography, Responsible AI, DevOps, Disaster Recovery

    Beginner · Specialization · 1 - 3 Months

  • Status: Free
    Free
    É

    École normale supérieure

    Ecological and Energy Transitions in Southern Countries

    Skills you'll gain: Sustainable Development, Economic Development, Environmental Science, Energy and Utilities, Governance, Environment, Sustainability Reporting, Climate Change Mitigation, Climate Change Adaptation, Environmental Policy, Finance, Advocacy, Economics, Lobbying, Public Policies

    4.8
    Rating, 4.8 out of 5 stars
    ·
    40 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Preview
    Preview
    L

    LearnQuest

    The Cybersecurity Culture Blueprint: A Proactive Approach

    Skills you'll gain: Incident Response, Incident Management, Cybersecurity, Human Factors (Security), Security Awareness, Continuous Monitoring, Cyber Security Strategy, Cyber Governance, Computer Security Awareness Training, Culture Transformation, Threat Detection, Organizational Change, Employee Training, Employee Engagement, Communication Strategies

    Beginner · Course · 1 - 4 Weeks

  • P

    Packt

    TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-003)

    Skills you'll gain: Cyber Threat Intelligence, Vulnerability Assessments, Incident Response, Cybersecurity, Threat Modeling, Cyber Threat Hunting, Threat Detection, Application Security, Security Management, Intrusion Detection and Prevention, Security Controls, Malware Protection, Network Analysis

    Intermediate · Course · 3 - 6 Months

  • Status: Free
    Free
    C

    Check Point Software Technologies Ltd.

    Check Point Jump Start: Harmony Endpoint Security

    Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Software, Security Management, Cybersecurity, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Network Protocols, Software Installation, Linux

    4.7
    Rating, 4.7 out of 5 stars
    ·
    14 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    C

    Codio

    Software Security for Web Applications

    Skills you'll gain: Application Security, OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Server Side, Security Strategy

    4.9
    Rating, 4.9 out of 5 stars
    ·
    17 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    W

    Whizlabs

    Exam Prep: Certified Information Systems Auditor (CISA)

    Skills you'll gain: Audit Planning, Network Security, Disaster Recovery, Cyber Attacks, Business Continuity Planning, Security Testing, Digital Forensics, Infrastructure Security, Identity and Access Management, Database Management, Enterprise Architecture, Database Administration, Compliance Management, Regulatory Compliance, Auditing, Quality Assurance, Cloud Computing, OSI Models, Asset Management, Quality Management

    4.6
    Rating, 4.6 out of 5 stars
    ·
    9 reviews

    Intermediate · Specialization · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    Cybersecurity Prevention and Detection

    Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Security Information and Event Management (SIEM), Cybersecurity, Threat Management, Cloud Security, Cyber Risk, Intrusion Detection and Prevention, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Personally Identifiable Information, Malware Protection, Security Controls, Email Security, Risk Management

    Beginner · Specialization · 1 - 4 Weeks

  • P

    Packt

    Intermediate Ethical Hacking Hands-on Training

    Skills you'll gain: Penetration Testing, Metasploit, Open Web Application Security Project (OWASP), Network Protocols, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Brute-force attacks, Windows PowerShell, Active Directory, Network Security, Network Analysis, Microsoft Windows, Wireless Networks, Scripting, Virtual Environment

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    C

    Coursera

    Introduction to Prompt Injection Vulnerabilities

    Skills you'll gain: AI Security, Large Language Modeling, Cybersecurity, Prompt Engineering, Cyber Security Strategy, Threat Modeling, Cyber Security Assessment, Risk Analysis, Application Security, Vulnerability Assessments, Network Security

    3.6
    Rating, 3.6 out of 5 stars
    ·
    19 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free
    Free
    C

    Coursera

    Wireshark for Security: Detect Network Anomalies

    Skills you'll gain: Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Network Troubleshooting, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture

    4.1
    Rating, 4.1 out of 5 stars
    ·
    8 reviews

    Intermediate · Guided Project · Less Than 2 Hours

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Previous OWASP Risks

    Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Security Testing, Threat Modeling, Exploitation techniques, Application Security, Vulnerability Assessments, Extensible Markup Language (XML)

    4.8
    Rating, 4.8 out of 5 stars
    ·
    22 reviews

    Intermediate · Course · 1 - 4 Weeks

1…373839…54

In summary, here are 10 of our most popular cyber exploitation courses

  • Practical Cybersecurity Fundamentals: Pearson
  • Ecological and Energy Transitions in Southern Countries: École normale supérieure
  • The Cybersecurity Culture Blueprint: A Proactive Approach: LearnQuest
  • TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-003): Packt
  • Check Point Jump Start: Harmony Endpoint Security: Check Point Software Technologies Ltd.
  • Software Security for Web Applications: Codio
  • Exam Prep: Certified Information Systems Auditor (CISA): Whizlabs
  • Cybersecurity Prevention and Detection: Pearson
  • Intermediate Ethical Hacking Hands-on Training: Packt
  • Introduction to Prompt Injection Vulnerabilities: Coursera

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok