Take your ethical hacking knowledge to the next level with this intermediate course designed for aspiring cybersecurity professionals. Begin with active information gathering and port scanning, where you'll master tools like Nmap and Zenmap, and learn techniques for bypassing firewalls and utilizing Nmap scripts. This comprehensive module ensures you have a robust understanding of network mapping and vulnerability scanning, critical for identifying and mitigating security threats.
Intermediate Ethical Hacking Techniques
This course is part of The Complete Ethical Hacking Bootcamp: Beginner To Advanced Specialization
Recommended experience
What you'll learn
Install and configure Metasploitable and other essential tools.
Analyze network structures through advanced mapping and vulnerability scanning.
Apply various attack methods to perform web application penetration tests.
Evaluate wireless network security by conducting exploitation and password cracking.
Skills you'll gain
Details to know
Add to your LinkedIn profile
September 2024
3 assignments
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 4 modules in this course
In this module, we will explore active information gathering and port scanning techniques. You will learn to install Metasploitable, use Nmap and Zenmap for network mapping, execute TCP scans, bypass firewalls, and utilize Nmap scripts for detailed information gathering.
What's included
9 videos1 reading
In this module, we will dive into web application penetration testing. You will gain hands-on experience with OWASP, BurpSuite, and various tools to perform HTTP testing, password recovery attacks, brute force attacks, session fixation, and multiple types of injection attacks, including SQL and XSS.
What's included
24 videos1 assignment
In this module, we will cover wireless penetration testing techniques. You will learn to capture handshakes, crack passwords using various tools, create password lists, utilize rainbow tables, and prevent common wireless attacks, ensuring a robust understanding of wireless security.
What's included
13 videos
In this module, we will focus on system hacking and exploitation. You will learn to use the Metasploit console, execute various hacking techniques, craft payloads, gain Meterpreter sessions, perform post-exploitation activities, and implement strategies to prevent privilege escalation, ensuring a comprehensive approach to system security.
What's included
21 videos1 reading2 assignments
Recommended if you're interested in Computer Security and Networks
Why people choose Coursera for their career
New to Computer Security and Networks? Start here.
Open new doors with Coursera Plus
Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.