• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Exploits

Results for "exploits"


  • E

    Edureka

    Cyber Threats and Network Security Foundations

    Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Cyber Security Strategy, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, IT Security Architecture, Cyber Attacks, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management

    Beginner · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Intermediate Ethical Hacking Techniques

    Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Exploit development, Vulnerability Scanning, Exploitation techniques, Security Testing, Vulnerability Assessments, Hardening, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL

    ★ 3.8 (9) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • C

    Coursera

    Detect & Respond to Mobile AI Threats

    Skills you'll gain: Mobile Security, AI Security, Exploitation techniques, Threat Detection, Security Controls, Intrusion Detection and Prevention, Threat Modeling, Hardening, AI literacy, Malware Protection, Endpoint Security, Artificial Intelligence, Mobile Development Tools, Prompt Engineering, Human Factors (Security), Incident Response, Information Privacy

    Intermediate · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • E

    EC-Council

    Ethical Hacking Essentials: Hands-On Edition

    Skills you'll gain: Penetration Testing, Cybersecurity, Threat Management, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Cyber Security Assessment, Application Security, Threat Detection, Security Testing, Cyber Attacks, Brute-force attacks, MITRE ATT&CK Framework, Encryption, Vulnerability Scanning, Cloud Computing, Exploitation techniques, Web Applications, Wireless Networks

    Beginner · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Ethical Hacking Foundations & Network Security

    Skills you'll gain: Metasploit, Penetration Testing, Network Security, Exploit development, Vulnerability Scanning, Security Testing, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Vulnerability Assessments, Information Systems Security, Cyber Attacks, Command-Line Interface, Linux Administration, Linux Commands, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration

    ★ 4.8 (13) · Beginner · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • E

    EDUCBA

    Ethical Hacking with Kali Linux: Learn & Secure

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Hardening, Cybersecurity, Security Testing, Vulnerability Assessments, Network Analysis, Exploitation techniques, Linux, System Configuration, Linux Administration, Virtual Machines, Linux Commands, Operating Systems, Software Installation

    ★ 4.9 (30) · Mixed · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • J

    Johns Hopkins University

    Cybersecurity Foundations: Threats Networks, and IoT Protection

    Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, Routing Protocols, TCP/IP, Internet Of Things, Network Security, Cyber Attacks, Threat Detection, Network Monitoring, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software), Containerization

    ★ 4.7 (6) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • A

    AI CERTs

    Bitcoin Threats & Future Security

    Skills you'll gain: Threat Management, Cyber Security Assessment, Security Controls, Cyber Attacks, Cyber Threat Intelligence, Information Systems Security, Regulatory Compliance, Financial Regulation

    Advanced · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Writing Secure Code in ASP.NET

    Skills you'll gain: Authentications, Cryptography, Encryption, .NET Framework, Security Testing, Application Security, Hardening, Data Security, Data Access, Exploitation techniques, Application Frameworks, Application Development, Data Validation, Development Environment

    Intermediate · Course · 1 - 4 Weeks

    Category: Credit offered
    Credit offered
  • W

    Whizlabs

    AWS: Security and Key Management

    Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Identity and Access Management, Cloud Security, Network Security, Threat Detection, Amazon S3, Data Security, Security Management, Vulnerability Management, Firewall, Vulnerability Assessments, Vulnerability Scanning, Key Management, User Provisioning, Role-Based Access Control (RBAC), Distributed Denial-Of-Service (DDoS) Attacks, Authorization (Computing), Authentications, Encryption

    Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking the Network

    Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers

    ★ 4.7 (13) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Build toward a degree
    Build toward a degree
  • I

    Infosec

    Execution, persistence, privilege escalation and evasion

    Skills you'll gain: Cybersecurity, Cyber Operations, Data Persistence, Exploitation techniques, Persistence, Intrusion Detection and Prevention, Scripting, Python Programming, Scripting Languages

    ★ 4.6 (97) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
1…789…10

In summary, here are 10 of our most popular exploits courses

  • Cyber Threats and Network Security Foundations: Edureka
  • Intermediate Ethical Hacking Techniques: Packt
  • Detect & Respond to Mobile AI Threats: Coursera
  • Ethical Hacking Essentials: Hands-On Edition: EC-Council
  • Ethical Hacking Foundations & Network Security: Packt
  • Ethical Hacking with Kali Linux: Learn & Secure: EDUCBA
  • Cybersecurity Foundations: Threats Networks, and IoT Protection: Johns Hopkins University
  • Bitcoin Threats & Future Security : AI CERTs
  • Writing Secure Code in ASP.NET: Packt
  • AWS: Security and Key Management: Whizlabs

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok