Coursera
  • Online DegreeExplore Bachelor’s & Master’s degrees
  • MasterTrack™Earn credit towards a Master’s degree
  • University CertificatesAdvance your career with graduate-level learning
Find your New CareerFor EnterpriseFor Universities
  • Browse
  • Top Courses
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Pen Testing

    Filter by

    6 results for "pen testing"

    • Placeholder
      EC-Council

      Ethical Hacking Essentials (EHE)

      Skills you'll gain: Security Engineering, Computer Networking, Network Security, Cyberattacks, Operating Systems, System Security, Computer Architecture, Software Engineering, Data Management, Network Architecture, Cloud Computing, Cloud Infrastructure, Computer Programming, Computer Security Incident Management, Computer Security Models, Databases, Docker (Software), Finance, Internet Of Things, Mobile Development, Mobile Security, Network Model, Other Programming Languages, Regulations and Compliance, SQL, Software Security, Software Testing, Statistical Programming, Supply Chain Systems, Supply Chain and Logistics

      4.7

      (29 reviews)

      Beginner · Course · 1-3 Months

    • Placeholder
      Coursera Project Network

      Write your own Python tool to footprint a web application

      Skills you'll gain: Computer Programming, Python Programming, Statistical Programming

      4.0

      (10 reviews)

      Intermediate · Guided Project · Less Than 2 Hours

    • Placeholder
      University of Colorado System

      Proactive Computer Security

      Skills you'll gain: Security Engineering, Computer Networking, Computer Security Incident Management, Cyberattacks, Network Security, Operating Systems, Software Engineering, Software Testing, System Security, Leadership and Management

      4.7

      (237 reviews)

      Beginner · Course · 1-3 Months

    • Placeholder
      University of Maryland, College Park

      Software Security

      Skills you'll gain: Security Engineering, Software Security

      4.6

      (1.6k reviews)

      Mixed · Course · 1-3 Months

    • Placeholder
      Johns Hopkins University

      Responding, Revising and Assessing Student Writings

      Skills you'll gain: Communication, Writing

      Beginner · Course · 1-4 Weeks

    • Placeholder
      University of Maryland, College Park

      Innovation for Entrepreneurs: From Idea to Marketplace

      Skills you'll gain: Entrepreneurship, Innovation, Research and Design, Leadership and Management, Business Analysis, Customer Analysis, Market Research, Marketing, Business Design, Business Development, Customer Relationship Management, Finance, Sales, Strategy and Operations, Business Psychology, Collaboration, Communication, Design and Product, Human Resources, Market Analysis, People Development, People Management, Product Design, Product Development, Strategy

      4.6

      (647 reviews)

      Mixed · Course · 1-3 Months

    1

    In summary, here are 10 of our most popular pen testing courses

    • Ethical Hacking Essentials (EHE): EC-Council
    • Write your own Python tool to footprint a web application: Coursera Project Network
    • Proactive Computer Security: University of Colorado System
    • Software Security: University of Maryland, College Park
    • Responding, Revising and Assessing Student Writings: Johns Hopkins University
    • Innovation for Entrepreneurs: From Idea to Marketplace: University of Maryland, College Park

    Skills you can learn in Computer Security And Networks

    Cybersecurity (33)
    Google (25)
    Google Cloud Platform (17)
    Internet (17)
    Cryptography (16)
    Network Security (16)
    Linux (12)
    Software Testing (12)
    Information Security (10)
    Application Programming Interfaces (8)
    Kubernetes (8)
    Web (8)

    Frequently Asked Questions about Pen Testing

    • Penetration testing, commonly referred to as pen testing or “ethical hacking,” is the process of conducting a simulated cyber attack on an organization’s computer system. Pen testing is an important technique used by cybersecurity professionals for exposing database vulnerabilities and network security flaws that could be exploited by hackers. With so much of today’s critical business as well as personal information accessible through the internet, cyber attacks can be incredibly costly or even dangerous, making this process of identifying vulnerabilities essential.

      Pen tests may use a variety of methods to execute a cyber attack, including brute force attacks, SQL injection, phishing, or even hardware devices. In order to simulate real-world cyber attacks as closely as possible, a “single-blind” test is typically carried out by an outside cybersecurity or IT security analyst with no prior knowledge of the network security systems in place, and in a “double-blind” test the company’s own IT and cybersecurity team is not given advance notice. Pen testing procedures also vary depending on whether the organization wants to simulate an external attack from an outside hacker or an internal attack from a disgruntled employee.‎

    • Pen testing is an essential part of the toolkit of IT security analysts and cybersecurity consultants, who are responsible for helping companies protect their computer networks and systems against malicious cyber attacks. Unknown network security vulnerabilities can lead to incredibly costly data breaches, potentially exposing private information of an organization, its employees, and its customers, making the identification of these flaws a critically important part of cybersecurity.

      Given the elevated and increasing importance of cybersecurity today, professionals in this field are highly sought after. According to the Bureau of Labor Statistics, information security analysts earned a median annual salary of $99,730 in 2019, and these jobs are expected to grow by 31% between 2019 and 2029 - much faster than average job growth across the rest of the economy.‎

    • Certainly. Coursera offers many opportunities to learn about penetration testing and other cybersecurity topics, including individual courses and Specializations spanning multiple courses. You can learn from top-ranked schools like University of California Davis, University of Maryland College Park, University of Colorado, and the University of London, or you can take courses from IBM to earn a professional certificate in cybersecurity. Regardless of where you want to learn from, Coursera lets you view course materials and complete coursework on a flexible schedule so that you can add these important cybersecurity skills to your resume while continuing to pursue your other schoolwork or existing career.‎

    • Because penetration testing isn't a beginner-level skill, you should have a solid technical background in basic Unix commands, software development, and using Linux. Without this experience and skill set, you'll likely struggle with learning pen testing. You should also have a good foundation in the basics of coding, particularly full-stack skills, including Python, JavaScript, CSS, and HTML. Some classes may have other prerequisites, such as having an understanding of TCP/IP, networking, and/or Bash scripting.‎

    • If you have a strong drive to understand how things work and to beat hackers at their own game, then learning penetration testing might be the ideal subject for you. As a pen tester, you'll be tasked with finding and fixing vulnerabilities, including ones that were previously unknown. You'll also discover how an attack would impact a business and assess how effectively organizations are able to respond and detect attacks. If working on the front lines in the war against hackers and those who threaten cybersecurity sounds exciting, learning pen testing will get you on your way to creating a career doing just that.‎

    • Although you don't need a degree to build a career in penetration testing, gaining a formal education in computer science or computer security can help you develop some of the skills you'll need. Common undergraduate degrees for people interested in this field include information security, computer engineering, cybersecurity, and math. Some penetration testers go on to earn their master's degree in cybersecurity or a related field while others go on to work as a network or systems administrator before pursuing certification. Some of the most common certifications include the Certified Ethical Hacker or the Licensed Penetration Tester Master from the EC-Council, the Certified Expert Penetration Tester from the Information Assurance Certification Review Board, and the CompTIA Security+ credential.‎

    • Any organization within any industry can benefit from pen testing, but some of the industries most likely to hire pen testers include those that are highly regulated, like health care, banking and finance companies, and service providers. Pen testers can use their skills to test for compliance with regulations. For example, pen testers might perform an audit of a medical device company, hospital, or health care information exchange to ensure it's HIPAA-compliant. Other places rely on pen testing to reveal vulnerabilities in their websites, networks, and systems to remain more secure and enact policies to stay that way.‎

    This FAQ content has been made available for informational purposes only. Learners are advised to conduct additional research to ensure that courses and other credentials pursued meet their personal, professional, and financial goals.
    Other topics to explore
    Placeholder
    Arts and Humanities
    338 courses
    Placeholder
    Business
    1095 courses
    Placeholder
    Computer Science
    668 courses
    Placeholder
    Data Science
    425 courses
    Placeholder
    Information Technology
    145 courses
    Placeholder
    Health
    471 courses
    Placeholder
    Math and Logic
    70 courses
    Placeholder
    Personal Development
    137 courses
    Placeholder
    Physical Science and Engineering
    413 courses
    Placeholder
    Social Sciences
    401 courses
    Placeholder
    Language Learning
    150 courses

    Coursera Footer

    Start or advance your career

    • Google Data Analyst
    • Google Digital Marketing & E-commerce Professional Certificate
    • Google IT Automation with Python Professional Certificate
    • Google IT Support
    • Google Project Management
    • Google UX Design
    • Preparing for Google Cloud Certification: Cloud Architect
    • IBM Cybersecurity Analyst
    • IBM Data Analyst
    • IBM Data Engineering
    • IBM Data Science
    • IBM Full Stack Cloud Developer
    • IBM Machine Learning
    • Intuit Bookkeeping
    • Meta Front-End Developer
    • DeepLearning.AI TensorFlow Developer Professional Certificate
    • SAS Programmer Professional Certificate
    • Launch your career
    • Prepare for a certification
    • Advance your career
    • How to Identify Python Syntax Errors
    • How to Catch Python Exceptions
    • See all Programming Tutorials

    Popular Courses and Certifications

    • Free Courses
    • Artificial Intelligence Courses
    • Blockchain Courses
    • Computer Science Courses
    • Cursos Gratis
    • Cybersecurity Courses
    • Data Analysis Courses
    • Data Science Courses
    • English Speaking Courses
    • Full Stack Web Development Courses
    • Google Courses
    • Human Resources Courses
    • IT Courses
    • Learning English Courses
    • Microsoft Excel Courses
    • Product Management Courses
    • Project Management Courses
    • Python Courses
    • SQL Courses
    • Agile Certifications
    • CAPM Certification
    • CompTIA A+ Certification
    • Data Analytics Certifications
    • Scrum Master Certifications
    • See all courses

    Popular collections and articles

    • Free online courses you can finish in a day
    • Popular Free Courses
    • Business Jobs
    • Cybersecurity Jobs
    • Entry-Level IT Jobs
    • Data Analyst Interview Questions
    • Data Analytics Projects
    • How to Become a Data Analyst
    • How to Become a Project Manager
    • IT Skills
    • Project Manager Interview Questions
    • Python Programming Skills
    • Strength and Weakness in Interview
    • What Does a Data Analyst Do
    • What Does a Software Engineer Do
    • What Is a Data Engineer
    • What Is a Data Scientist
    • What Is a Product Designer
    • What Is a Scrum Master
    • What Is a UX Researcher
    • How to Get a PMP Certification
    • PMI Certifications
    • Popular Cybersecurity Certifications
    • Popular SQL Certifications
    • Read all Coursera Articles

    Earn a degree or certificate online

    • Google Professional Certificates
    • Professional Certificates
    • See all certificates
    • Bachelor's Degrees
    • Master's Degrees
    • Computer Science Degrees
    • Data Science Degrees
    • MBA & Business Degrees
    • Data Analytics Degrees
    • Public Health Degrees
    • Social Sciences Degrees
    • Management Degrees
    • BA vs BS Degree
    • What is a Bachelor's Degree?
    • 11 Good Study Habits to Develop
    • How to Write a Letter of Recommendation
    • 10 In-Demand Jobs You Can Get with a Business Degree
    • Is a Master's in Computer Science Worth it?
    • See all degree programs
    • Coursera India
    • Coursera UK
    • Coursera Mexico

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Coronavirus Response

    Community

    • Learners
    • Partners
    • Beta Testers
    • Translators
    • Blog
    • Tech Blog
    • Teaching Center

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    Learn Anywhere
    Placeholder
    Placeholder
    Placeholder
    © 2023 Coursera Inc. All rights reserved.
    • Placeholder
    • Placeholder
    • Placeholder
    • Placeholder
    • Placeholder