• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Security Testing Techniques

Results for "security testing techniques"


  • C

    Coursera

    Web Application Security Testing with OWASP ZAP

    Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Brute-force attacks, Test Tools, Web Scraping

    4.3
    Rating, 4.3 out of 5 stars
    ·
    290 reviews

    Intermediate · Guided Project · Less Than 2 Hours

  • P

    Packt

    Introduction to AWS Pentesting

    Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Penetration Testing, Exploit development, Security Testing, Cyber Security Assessment, Identity and Access Management, Vulnerability Assessments, Cloud Security, Amazon Elastic Compute Cloud, Exploitation techniques, Cyber Security Policies, Data Security, Amazon S3, Scenario Testing, Command-Line Interface

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Web Application Security Testing with Google Hacking

    Skills you'll gain: Security Testing, Penetration Testing, Vulnerability Scanning, Data Security, Application Security, Vulnerability Assessments, Personally Identifiable Information, Data Loss Prevention, Web Applications, Web Servers, SQL

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Cybersecurity and Network Defense Fundamentals

    Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Foundations and Reconnaissance Techniques

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, MITRE ATT&CK Framework, Security Testing, Payment Card Industry (PCI) Data Security Standards, NIST 800-53, Network Analysis, General Data Protection Regulation (GDPR), Cloud Computing

    4.8
    Rating, 4.8 out of 5 stars
    ·
    8 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking the Network

    Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers

    Build toward a degree

    4.7
    Rating, 4.7 out of 5 stars
    ·
    13 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Identifying Security Vulnerabilities in C/C++Programming

    Skills you'll gain: Secure Coding, Application Security, C and C++, Linux Administration, Verification And Validation, Code Review, Vulnerability Management, Linux, Security Controls, Vulnerability Assessments, Unix, User Accounts, Data Validation, File I/O, Cryptography, File Systems, System Programming, C (Programming Language), Identity and Access Management, Encryption

    4.6
    Rating, 4.6 out of 5 stars
    ·
    81 reviews

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Linux Security Techniques

    Skills you'll gain: Linux Servers, Linux Commands, Network Administration, Cryptography, User Accounts, Key Management, Brute-force attacks

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Proactive Computer Security

    Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Metasploit, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Information Systems Security, Exploitation techniques, Data Sharing

    4.7
    Rating, 4.7 out of 5 stars
    ·
    267 reviews

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Preview
    Preview
    I

    ISC2

    Foundations of Software Lifecycle Development and Security

    Skills you'll gain: Systems Development Life Cycle, Security Architecture Review, Security Controls, Software Testing, Security Management, Software Development, Continuous Monitoring

    Beginner · Course · 1 - 3 Months

  • P

    Packt

    Digital Forensics for Pentesters - Hands-On Learning

    Skills you'll gain: Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Network Protocols, Network Analysis, Network Monitoring, Image Analysis, Virtual Machines, Virtualization and Virtual Machines, Virtual Environment, Open Source Technology, Malware Protection, Command-Line Interface, Software Installation, File Management, Microsoft Windows

    4.6
    Rating, 4.6 out of 5 stars
    ·
    14 reviews

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    Offensive Hacking Unfolded - Become a Pro Pentester

    Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Brute-force attacks, Virtual Environment, Cybersecurity, Technical Writing, Web Servers, Linux

    4
    Rating, 4 out of 5 stars
    ·
    7 reviews

    Beginner · Course · 1 - 3 Months

1…678…781

In summary, here are 10 of our most popular security testing techniques courses

  • Web Application Security Testing with OWASP ZAP: Coursera
  • Introduction to AWS Pentesting: Packt
  • Web Application Security Testing with Google Hacking: Packt
  • Cybersecurity and Network Defense Fundamentals: Edureka
  • Foundations and Reconnaissance Techniques: Packt
  • Security & Ethical Hacking: Attacking the Network: University of Colorado Boulder
  • Identifying Security Vulnerabilities in C/C++Programming: University of California, Davis
  • Linux Security Techniques: Packt
  • Proactive Computer Security: University of Colorado System
  • Foundations of Software Lifecycle Development and Security: ISC2

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok