• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Exploitation Techniques

Results for "exploitation techniques"


  • Status: Free Trial
    Free Trial
    E

    EDUCBA

    Ethical Hacking with Metasploit, SQL & Crypto

    Skills you'll gain: Exploit development, Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Security Testing, Data Import/Export, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, SQL, Command-Line Interface

    4.8
    Rating, 4.8 out of 5 stars
    ·
    20 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Advanced Neural Network Techniques

    Skills you'll gain: Autoencoders, Recurrent Neural Networks (RNNs), Deep Learning, Artificial Neural Networks, Reinforcement Learning, Generative AI, Generative Adversarial Networks (GANs), Generative Model Architectures, Unsupervised Learning, Responsible AI, Data Ethics, Markov Model

    4
    Rating, 4 out of 5 stars
    ·
    7 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Pearson

    Certified Ethical Hacker (CEH): Unit 3

    Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Vulnerability Management, Malware Protection, Threat Detection, Penetration Testing, Threat Management, Cybersecurity, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Preview
    Preview
    E

    EDUCBA

    Apply XPathNavigator Techniques for XML Processing in .NET

    Skills you'll gain: Extensible Markup Language (XML), Extensible Languages and XML, .NET Framework, Query Languages

    Beginner · Course · 1 - 4 Weeks

  • P

    Packt

    Offensive Hacking Unfolded - Become a Pro Pentester

    Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Brute-force attacks, Virtual Environment, Cybersecurity, Technical Writing, Web Servers, Linux

    4
    Rating, 4 out of 5 stars
    ·
    7 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    E

    EC-Council

    Ethical Hacking Essentials: Hands-On Edition

    Skills you'll gain: Penetration Testing, Cybersecurity, Threat Management, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Cyber Security Assessment, Application Security, Threat Detection, Security Testing, Cyber Attacks, Brute-force attacks, MITRE ATT&CK Framework, Encryption, Vulnerability Scanning, Cloud Computing, Exploitation techniques, Web Applications, Wireless Networks

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Web Security, Social Engineering & External Attacks

    Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Exploit development, Application Security, Security Testing, Exploitation techniques, Vulnerability Scanning, Security Awareness, Vulnerability Assessments, Human Factors (Security), Hardening

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    I

    Infosec

    Memory, Encryption, and Protecting Data in Android

    Skills you'll gain: Cryptography, Encryption, Android Development, Key Management, Exploit development, Android (Operating System), Secure Coding, Mobile Security, Data Security, Application Security, Data Loss Prevention, Network Security, Exploitation techniques, Memory Management, File Systems

    Mixed · Course · 1 - 4 Weeks

  • C

    Coursera

    Metasploit for Beginners: Ethical Penetration Testing

    Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Command-Line Interface, Virtual Machines, Linux, Technical Documentation

    4.8
    Rating, 4.8 out of 5 stars
    ·
    72 reviews

    Beginner · Guided Project · Less Than 2 Hours

  • Status: Free Trial
    Free Trial
    P

    Packt

    Introduction to Ethical Hacking and Recon Techniques

    Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Management, Threat Detection, Cyber Security Assessment, Cybersecurity, Cyber Security Strategy, Cyber Operations, Vulnerability Scanning, Cyber Attacks, Computer Security, Vulnerability Assessments, Security Strategy, Cyber Security Policies, Network Security, Network Analysis, Network Protocols

    4.8
    Rating, 4.8 out of 5 stars
    ·
    14 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Applied Machine Learning: Techniques and Applications

    Skills you'll gain: Computer Vision, Model Evaluation, Supervised Learning, Image Analysis, Data Preprocessing, Applied Machine Learning, Machine Learning Methods, Feature Engineering, Machine Learning Algorithms, Data Processing, Model Training, Model Optimization, Machine Learning, Data Cleansing, Scikit Learn (Machine Learning Library), Machine Learning Software, Data Integration, Data Transformation, Classification Algorithms, Dimensionality Reduction

    3.7
    Rating, 3.7 out of 5 stars
    ·
    12 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Advanced Web Exploits, Python Scripting & Network Attacks

    Skills you'll gain: Penetration Testing, Exploit development, OSI Models, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Network Protocols, Network Security, Cyber Security Assessment, General Networking, Vulnerability Scanning, Cybersecurity, Prompt Engineering, Large Language Modeling, AI Security, LLM Application, Test Script Development, Scripting, Scripting Languages, Python Programming

    4.3
    Rating, 4.3 out of 5 stars
    ·
    7 reviews

    Intermediate · Course · 1 - 3 Months

1…678…455

In summary, here are 10 of our most popular exploitation techniques courses

  • Ethical Hacking with Metasploit, SQL & Crypto: EDUCBA
  • Advanced Neural Network Techniques: Johns Hopkins University
  • Certified Ethical Hacker (CEH): Unit 3: Pearson
  • Apply XPathNavigator Techniques for XML Processing in .NET: EDUCBA
  • Offensive Hacking Unfolded - Become a Pro Pentester: Packt
  • Ethical Hacking Essentials: Hands-On Edition: EC-Council
  • Web Security, Social Engineering & External Attacks: Packt
  • Memory, Encryption, and Protecting Data in Android: Infosec
  • Metasploit for Beginners: Ethical Penetration Testing: Coursera
  • Introduction to Ethical Hacking and Recon Techniques: Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok