• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Post Exploitation Techniques

Results for "post-exploitation techniques"


  • Status: Free Trial
    Free Trial
    P

    Packt

    Ethical Hacking Foundations & Network Security

    Skills you'll gain: Penetration Testing, Network Security, Vulnerability Scanning, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Command-Line Interface, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Software Installation, File Management, Virtual Machines

    4.8
    Rating, 4.8 out of 5 stars
    ·
    12 reviews

    Beginner · Course · 1 - 3 Months

  • C

    Coursera

    Metasploit for Beginners: Ethical Penetration Testing

    Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Command-Line Interface, Virtual Machines, Linux, Technical Documentation

    4.7
    Rating, 4.7 out of 5 stars
    ·
    71 reviews

    Beginner · Guided Project · Less Than 2 Hours

  • Status: New
    New
    P

    Packt

    Linux Security Techniques

    Skills you'll gain: User Accounts

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    Web Hacker's Toolbox - Tools Used by Successful Hackers

    Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Application Security, Exploitation techniques, Vulnerability Assessments, Test Tools, Web Applications, SQL, Databases

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Advanced Network Attacks, Web Hacking, and Cryptography

    Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Microsoft Intune (Mobile Device Management Software), Network Security, Cybersecurity, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Exploitation techniques, Web Applications, Cloud Security, Internet Of Things

    4.9
    Rating, 4.9 out of 5 stars
    ·
    17 reviews

    Intermediate · Course · 1 - 3 Months

  • S

    S.P. Jain Institute of Management and Research

    Post Graduate Diploma in Management Online

    Skills you'll gain: Mergers & Acquisitions, Search Engine Marketing, Working Capital, Competitive Analysis, Operations Management, Business Valuation, Design Thinking, Large Language Modeling, Business Strategy, Supply Chain Management, Production Planning, Consumer Behaviour, Team Management, Organizational Change, Change Management, Promotional Strategies, Financial Statement Analysis, Technical Consulting, Business Analytics, Business Ethics

    Earn a degree

    Degree · 1 - 4 Years

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Incident Response - Theory to Practice

    Skills you'll gain: Incident Response, Incident Management, Computer Security Incident Management, Cyber Security Strategy, Cyber Attacks, Security Management, Cyber Security Policies, Intrusion Detection and Prevention, Threat Detection, Disaster Recovery, Cybersecurity, Cyber Risk, Cyber Security Assessment, Crisis Management, Threat Management, Business Continuity, Safety and Security, Security Software, Strategic Communication, Regulation and Legal Compliance

    5
    Rating, 5 out of 5 stars
    ·
    6 reviews

    Beginner · Course · 1 - 3 Months

  • P

    Packt

    Offensive Hacking Unfolded - Become a Pro Pentester

    Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Brute-force attacks, Virtual Environment, Cybersecurity, Technical Writing, Web Servers, Linux

    4
    Rating, 4 out of 5 stars
    ·
    6 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    System Hacking, Malware Threats, and Network Attacks

    Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Threat Management, Brute-force attacks, Network Security, Information Systems Security, Security Awareness, Network Protocols

    4.8
    Rating, 4.8 out of 5 stars
    ·
    8 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    X

    Xbox

    Product Launch and Post-Launch Management

    Skills you'll gain: Product Planning, AI Product Strategy, Product Management, New Product Development, Quality Assurance and Control, Sales Strategy, Performance Analysis, Marketing Strategies, Product Marketing, Product Lifecycle Management, Product Improvement, Product Testing, Sales Enablement, Key Performance Indicators (KPIs), Cross-Functional Collaboration, User Feedback, Data Analysis, Customer Insights, Data-Driven Decision-Making

    4.6
    Rating, 4.6 out of 5 stars
    ·
    15 reviews

    Beginner · Course · 1 - 3 Months

  • C

    Coursera

    FEM - Linear, Nonlinear Analysis & Post-Processing

    Skills you'll gain: Finite Element Methods, Engineering Analysis, Simulation and Simulation Software, Engineering Calculations, Mathematical Modeling, Structural Analysis

    4.7
    Rating, 4.7 out of 5 stars
    ·
    205 reviews

    Intermediate · Guided Project · Less Than 2 Hours

  • Status: Free Trial
    Free Trial
    N

    National Academy of Sports Medicine

    Pre- and Post-Workout Supplements for the Beginner

    Skills you'll gain: Exercise Science, Physiology, Sports Medicine, Decision Making, Nutrition and Diet, Pharmacology

    4.8
    Rating, 4.8 out of 5 stars
    ·
    13 reviews

    Beginner · Course · 1 - 4 Weeks

1…789…441

In summary, here are 10 of our most popular post-exploitation techniques courses

  • Ethical Hacking Foundations & Network Security: Packt
  • Metasploit for Beginners: Ethical Penetration Testing: Coursera
  • Linux Security Techniques: Packt
  • Web Hacker's Toolbox - Tools Used by Successful Hackers: Packt
  • Advanced Network Attacks, Web Hacking, and Cryptography: Packt
  • Post Graduate Diploma in Management Online: S.P. Jain Institute of Management and Research
  • Cyber Security: Incident Response - Theory to Practice: Macquarie University
  • Offensive Hacking Unfolded - Become a Pro Pentester: Packt
  • System Hacking, Malware Threats, and Network Attacks: Packt
  • Product Launch and Post-Launch Management: Xbox

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok