• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Lambda Exploitation

Results for "lambda exploitation"


  • A

    Amazon Web Services

    Data Analytics and Databases on AWS

    Skills you'll gain: Extract, Transform, Load, Data-Driven Decision-Making, Amazon Web Services, Data Warehousing, Big Data, Databases, Business Analytics, NoSQL, Data Analysis, Data Pipelines, Unstructured Data, Data Processing, SQL, Data Storage, Data Architecture, Relational Databases, Data Transformation

    4.7
    Rating, 4.7 out of 5 stars
    ·
    57 reviews

    Beginner · Course · 1 - 4 Weeks

  • U

    University of Maryland, College Park

    Hardware Security

    Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Vulnerability Assessments, Application Specific Integrated Circuits, Exploit development, Cryptography, Systems Design, Encryption, Exploitation techniques, Technical Design, Emerging Technologies

    4.3
    Rating, 4.3 out of 5 stars
    ·
    690 reviews

    Mixed · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    L

    LearnKartS

    System & Network Security Essentials

    Skills you'll gain: Cybersecurity, Cyber Attacks, Malware Protection, Network Security, Information Systems Security, Intrusion Detection and Prevention, Security Testing, Penetration Testing, Firewall, Threat Detection, Internet Of Things, Exploitation techniques, Network Analysis

    4.8
    Rating, 4.8 out of 5 stars
    ·
    49 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    N

    New York University

    Introduction to Cyber Attacks

    Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Threat Detection, Information Systems Security, Network Security, Computer Security, Exploitation techniques, Encryption

    4.7
    Rating, 4.7 out of 5 stars
    ·
    2.9K reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    L

    LearnQuest

    Generative AI for Penetration Testing: Red Team

    Skills you'll gain: Penetration Testing, Metasploit, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cyber Security Assessment, Cyber Threat Intelligence, Generative AI, Cyber Operations, Data Ethics, Prompt Engineering, Automation

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Advanced Exploitation and Scripting Techniques

    Skills you'll gain: Penetration Testing, Exploitation techniques, Scripting, Scripting Languages, Python Programming, Cyber Operations, Object Oriented Programming (OOP), Network Security, Network Protocols, Debugging

    4.8
    Rating, 4.8 out of 5 stars
    ·
    12 reviews

    Advanced · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    L

    LearnKartS

    Cybersecurity Threats and Defense

    Skills you'll gain: Cybersecurity, Threat Management, Cyber Attacks, Threat Detection, Cloud Security, Disaster Recovery, Network Security, Malware Protection, Data Security, Intrusion Detection and Prevention, Hardening, Systems Architecture, Encryption

    Beginner · Course · 1 - 4 Weeks

  • P

    Packt

    Pentesting Fundamentals for Beginners

    Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Virtual Machines, Technical Documentation, Microsoft Windows, Windows PowerShell, Linux Commands, Command-Line Interface, Software Installation

    5
    Rating, 5 out of 5 stars
    ·
    6 reviews

    Intermediate · Course · 3 - 6 Months

  • P

    Packt

    Offensive Hacking Unfolded - Become a Pro Pentester

    Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Security Testing, Cybersecurity, Virtual Machines, Technical Writing, Web Servers, Linux

    4
    Rating, 4 out of 5 stars
    ·
    6 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Advanced Cybersecurity Techniques

    Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    Universidad de los Andes

    Vulnerabilidades y pruebas de penetración

    Skills you'll gain: Penetration Testing, Threat Detection, Vulnerability Assessments, Threat Modeling, IT Management, Cybersecurity, Exploitation techniques, Vulnerability Management, Cyber Security Assessment, Risk Management Framework, Cyber Attacks, Security Testing, Information Technology, Cyber Risk, Human Factors (Security), Application Servers, Web Servers, Web Applications

    4.6
    Rating, 4.6 out of 5 stars
    ·
    122 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Advanced Network Attacks, Web Hacking, and Cryptography

    Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Exploit development, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Secure Coding, Threat Modeling, Web Applications, Cloud Security, Internet Of Things

    4.9
    Rating, 4.9 out of 5 stars
    ·
    16 reviews

    Intermediate · Course · 1 - 3 Months

1…789…20

In summary, here are 10 of our most popular lambda exploitation courses

  • Data Analytics and Databases on AWS: Amazon Web Services
  • Hardware Security: University of Maryland, College Park
  • System & Network Security Essentials: LearnKartS
  • Introduction to Cyber Attacks: New York University
  • Generative AI for Penetration Testing: Red Team: LearnQuest
  • Advanced Exploitation and Scripting Techniques: Packt
  • Cybersecurity Threats and Defense: LearnKartS
  • Pentesting Fundamentals for Beginners: Packt
  • Offensive Hacking Unfolded - Become a Pro Pentester: Packt
  • Advanced Cybersecurity Techniques: Johns Hopkins University

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok