• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Exploitation Techniques

Results for "exploitation techniques"


  • E

    Edureka

    Cyber Threats and Network Security Foundations

    Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Cyber Security Strategy, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, IT Security Architecture, Cyber Attacks, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management

    Beginner · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Pearson

    Certified Ethical Hacker (CEH): Unit 2

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Threat Intelligence, Vulnerability Assessments, Exploitation techniques, Network Security, Network Analysis, Network Protocols

    ★ 4.6 (7) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    UiPath

    Automation Techniques in RPA

    Skills you'll gain: Email Automation, Web Scraping, Robotic Process Automation, Automation, Network Protocols, Data Import/Export, Document Management, Spreadsheet Software

    ★ 4.6 (38) · Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Exploit Development, Malware, & Defensive Strategies

    Skills you'll gain: Exploit development, Penetration Testing, Cyber Operations, Malware Protection, Exploitation techniques, Network Monitoring, Object Oriented Programming (OOP), Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting Languages, Scripting, Remote Access Systems, Python Programming, Program Development, Command-Line Interface, Code Reusability, Package and Software Management

    ★ 5 (9) · Advanced · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Web Hacking Expert - Full-Stack Exploitation Mastery

    Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript

    Intermediate · Course · 1 - 3 Months

    Category: Credit offered
    Credit offered
  • M

    Microsoft

    AI and Machine Learning Algorithms and Techniques

    Skills you'll gain: Unsupervised Learning, Generative AI, Large Language Modeling, Supervised Learning, Deep Learning, Generative Model Architectures, LLM Application, Applied Machine Learning, Artificial Intelligence and Machine Learning (AI/ML), Reinforcement Learning, Statistical Machine Learning, Machine Learning Algorithms, Model Training, Artificial Neural Networks, Feature Engineering, Unstructured Data, Model Evaluation, Dimensionality Reduction, Model Optimization

    ★ 4.7 (64) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of California, Davis

    Exploiting and Securing Vulnerabilities in Java Applications

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Security Strategy, Vulnerability Scanning, Security Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Exploitation techniques, Java, Security Controls, Java Programming, Patch Management, Dependency Analysis, Docker (Software)

    ★ 4.4 (66) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • R

    Royal Holloway, University of London

    Cybercrime

    Skills you'll gain: Human Factors (Security), Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Risk, Security Awareness, Social Sciences, Exploitation techniques, Culture, Psychology, Persuasive Communication

    ★ 4.8 (119) · Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Ethical Password Cracking

    Skills you'll gain: Penetration Testing, Brute-force attacks, Cyber Security Assessment, Exploitation techniques, Cyber Security Policies, Hardening, Encryption, Network Security, Security Testing, Cybersecurity, Application Security, Security Strategy, Data Storage, Vulnerability Assessments, Wireless Networks, Authentications, Cryptography, Data Security, Cyber Attacks, Drupal

    Intermediate · Course · 1 - 3 Months

    Category: New
    New
    Category: Credit offered
    Credit offered
  • P

    Packt

    Pentesting Fundamentals for Beginners

    Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Exploitation techniques, Test Tools, Virtual Machines, Technical Documentation, Microsoft Windows, Scripting

    ★ 5 (7) · Intermediate · Course · 3 - 6 Months

    Category: Credit offered
    Credit offered
  • M

    Macquarie University

    Cyber Security: Mobile Security

    Skills you'll gain: Digital Forensics, Mobile Security, Investigation, Mobile Development, Criminal Investigation and Forensics, Endpoint Security, Cybersecurity, iOS Development, Application Security, Cyber Security Strategy, Computer Security Incident Management, Computer Security, Data Analysis Software, Authentications, Data Integrity, Data Storage

    ★ 4.6 (14) · Beginner · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Pearson

    Certified Ethical Hacker (CEH): Unit 3

    Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Vulnerability Management, Malware Protection, Threat Detection, Penetration Testing, Threat Management, Cybersecurity, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security

    Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
1…456…453

In summary, here are 10 of our most popular exploitation techniques courses

  • Cyber Threats and Network Security Foundations: Edureka
  • Certified Ethical Hacker (CEH): Unit 2: Pearson
  • Automation Techniques in RPA: UiPath
  • Exploit Development, Malware, & Defensive Strategies: Packt
  • Web Hacking Expert - Full-Stack Exploitation Mastery: Packt
  • AI and Machine Learning Algorithms and Techniques: Microsoft
  • Exploiting and Securing Vulnerabilities in Java Applications: University of California, Davis
  • Cybercrime: Royal Holloway, University of London
  • Ethical Password Cracking: Packt
  • Pentesting Fundamentals for Beginners: Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok