This course will be useful to anyone who is an experienced cybersecurity practitioner and would like to take their skills to the next level. You will begin a multi-stage process by performing reconnaissance and simulating an attack using Metasploit. You'll then exploit code-execution, injection, and web-app vulnerabilities. Lastly, you'll exploit access, network, data, and file-configuration vulnerabilities. These all contribute to the first stage of the overall CFR-A program: Attack.

CyberSec First Responder – Advanced (CFR-A): Attack

CyberSec First Responder – Advanced (CFR-A): Attack
This course is part of CyberSec First Responder – Advanced (CFR-A): Exam CFA-110 Specialization

Instructor: Bill Rosenthal
Access provided by ExxonMobil
What you'll learn
In this course, you will get oriented to your tools and environment, exploit vulnerabilities in software, and exploit vulnerabilities in systems.
Skills you'll gain
- Exploitation techniques
- Vulnerability
- Vulnerability Assessments
- Exploit development
- Network Security
- Bash (Scripting Language)
- Cyber Attacks
- Proxy Servers
- System Configuration
- Penetration Testing
- Vulnerability Scanning
- Cybersecurity
- Data Security
- Scripting
- Python Programming
- Distributed Denial-Of-Service (DDoS) Attacks
- Metasploit
- Scripting Languages
- Linux
- Linux Commands
- Skills section collapsed. Showing 9 of 20 skills.
Details to know

Add to your LinkedIn profile
1 assignment
December 2025
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 4 modules in this course
Whether you're thinking like an attacker or a defender, it's always good to start by knowing what you're up against. This first lesson will ensure you're suitably acquainted with the systems and software that comprise the overall class environment. You'll also become more familiar with the role(s) each system or software plays throughout the course, as well as your initial role as a threat actor.
What's included
1 reading6 plugins
In this lesson, you'll conduct a simulated attack campaign by focusing on exploiting flaws in software. You'll execute different types of attacks on different types of software to see how these flaws can lead to significant compromise.
What's included
4 plugins
Your simulated attack campaign will continue and eventually conclude with this lesson, which shifts the focus from exploiting software vulnerabilities to exploiting flaws in systems. These flaws exist regardless of how up to date or regularly patched the organization's software is, so attackers won't hesitate to use them as a vector if the software-based attacks prove ineffective.
What's included
6 plugins
You'll wrap things up and then validate what you've learned in this course by taking an assessment.
What's included
1 reading1 assignment
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.






