• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Exploitation Techniques

Results for "exploitation techniques"


  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Cyber Threats and Network Security Foundations

    Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Cyber Security Strategy, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, IT Security Architecture, Cyber Attacks, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Pearson

    Certified Ethical Hacker (CEH): Unit 5

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Web Applications, Penetration Testing, Application Security, Security Controls, Security Testing, Vulnerability Assessments, Application Programming Interface (API), Exploitation techniques, Web Servers, Cloud Security

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    UiPath

    Automation Techniques in RPA

    Skills you'll gain: Email Automation, Web Scraping, Robotic Process Automation, Automation, Network Protocols, Data Import/Export, Document Management, Spreadsheet Software

    4.6
    Rating, 4.6 out of 5 stars
    ·
    38 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Exploiting and Securing Vulnerabilities in Java Applications

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Security Strategy, Vulnerability Scanning, Security Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Exploitation techniques, Java, Security Controls, Java Programming, Patch Management, Dependency Analysis, Docker (Software)

    4.4
    Rating, 4.4 out of 5 stars
    ·
    66 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Exploit Development, Malware, & Defensive Strategies

    Skills you'll gain: Exploit development, Penetration Testing, Cyber Operations, Malware Protection, Exploitation techniques, Network Monitoring, Object Oriented Programming (OOP), Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting Languages, Scripting, Remote Access Systems, Python Programming, Program Development, Command-Line Interface, Code Reusability, Package and Software Management

    5
    Rating, 5 out of 5 stars
    ·
    9 reviews

    Advanced · Course · 1 - 3 Months

  • P

    Packt

    Web Hacking Expert - Full-Stack Exploitation Mastery

    Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    AI and Machine Learning Algorithms and Techniques

    Skills you'll gain: Unsupervised Learning, Generative AI, Large Language Modeling, Supervised Learning, Deep Learning, Generative Model Architectures, LLM Application, Applied Machine Learning, Artificial Intelligence and Machine Learning (AI/ML), Reinforcement Learning, Statistical Machine Learning, Machine Learning Algorithms, Model Training, Artificial Neural Networks, Feature Engineering, Unstructured Data, Model Evaluation, Dimensionality Reduction, Model Optimization

    4.7
    Rating, 4.7 out of 5 stars
    ·
    64 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    R

    Royal Holloway, University of London

    Cybercrime

    Skills you'll gain: Human Factors (Security), Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Risk, Security Awareness, Social Sciences, Exploitation techniques, Culture, Psychology, Persuasive Communication

    4.8
    Rating, 4.8 out of 5 stars
    ·
    119 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Pearson

    Certified Ethical Hacker (CEH): Unit 2

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Threat Intelligence, Vulnerability Assessments, Exploitation techniques, Network Security, Network Analysis, Network Protocols

    4.6
    Rating, 4.6 out of 5 stars
    ·
    7 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    P

    Packt

    Ethical Password Cracking

    Skills you'll gain: Penetration Testing, Brute-force attacks, Cyber Security Assessment, Exploitation techniques, Cyber Security Policies, Hardening, Encryption, Network Security, Security Testing, Cybersecurity, Application Security, Security Strategy, Data Storage, Vulnerability Assessments, Wireless Networks, Authentications, Cryptography, Data Security, Cyber Attacks, Drupal

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Mobile Security

    Skills you'll gain: Mobile Security, Digital Forensics, Investigation, Mobile Development, Criminal Investigation and Forensics, Endpoint Security, Cybersecurity, iOS Development, Application Security, Cyber Security Strategy, Computer Security Incident Management, Computer Security, Data Analysis Software, Authentications, Data Integrity, Data Storage

    4.6
    Rating, 4.6 out of 5 stars
    ·
    14 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    S

    SkillUp

    Improvement Techniques and Control Tools

    Skills you'll gain: Lean Methodologies, Process Improvement, Quality Improvement, Lean Manufacturing, Lean Six Sigma, Process Improvement and Optimization, Statistical Process Controls, Continuous Improvement Process, Process Optimization, Six Sigma Methodology, Quality Control, Quality Monitoring, Employee Training, Operational Efficiency, Waste Minimization, Data-Driven Decision-Making, Training Programs

    4.5
    Rating, 4.5 out of 5 stars
    ·
    10 reviews

    Beginner · Course · 1 - 3 Months

1…456…455

In summary, here are 10 of our most popular exploitation techniques courses

  • Cyber Threats and Network Security Foundations: Edureka
  • Certified Ethical Hacker (CEH): Unit 5: Pearson
  • Automation Techniques in RPA: UiPath
  • Exploiting and Securing Vulnerabilities in Java Applications: University of California, Davis
  • Exploit Development, Malware, & Defensive Strategies: Packt
  • Web Hacking Expert - Full-Stack Exploitation Mastery: Packt
  • AI and Machine Learning Algorithms and Techniques: Microsoft
  • Cybercrime: Royal Holloway, University of London
  • Certified Ethical Hacker (CEH): Unit 2: Pearson
  • Ethical Password Cracking: Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok