This course will be useful to anyone who is an experienced cybersecurity practitioner and would like to take their skills to the next level. You will begin a multi-stage process by performing reconnaissance and simulating an attack using Metasploit. You'll then exploit code-execution, injection, and web-app vulnerabilities. Lastly, you'll exploit access, network, data, and file-configuration vulnerabilities. These all contribute to the first stage of the overall CFR-A program: Attack.

CyberSec First Responder – Advanced (CFR-A): Attack

CyberSec First Responder – Advanced (CFR-A): Attack
This course is part of CyberSec First Responder – Advanced (CFR-A): Exam CFA-110 Specialization

Instructor: Bill Rosenthal
Access provided by Interbank
What you'll learn
In this course, you will get oriented to your tools and environment, exploit vulnerabilities in software, and exploit vulnerabilities in systems.
Skills you'll gain
- Vulnerability Assessments
- Python Programming
- Scripting Languages
- Metasploit
- Network Security
- Vulnerability Scanning
- Scripting
- Linux
- Vulnerability
- Exploitation techniques
- System Configuration
- Linux Commands
- Cyber Attacks
- Exploit development
- Penetration Testing
- Data Security
- Proxy Servers
- Bash (Scripting Language)
- Distributed Denial-Of-Service (DDoS) Attacks
- Cybersecurity
- Skills section collapsed. Showing 11 of 20 skills.
Details to know

Add to your LinkedIn profile
1 assignment
December 2025
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 4 modules in this course
Whether you're thinking like an attacker or a defender, it's always good to start by knowing what you're up against. This first lesson will ensure you're suitably acquainted with the systems and software that comprise the overall class environment. You'll also become more familiar with the role(s) each system or software plays throughout the course, as well as your initial role as a threat actor.
What's included
1 reading6 plugins
In this lesson, you'll conduct a simulated attack campaign by focusing on exploiting flaws in software. You'll execute different types of attacks on different types of software to see how these flaws can lead to significant compromise.
What's included
4 plugins
Your simulated attack campaign will continue and eventually conclude with this lesson, which shifts the focus from exploiting software vulnerabilities to exploiting flaws in systems. These flaws exist regardless of how up to date or regularly patched the organization's software is, so attackers won't hesitate to use them as a vector if the software-based attacks prove ineffective.
What's included
6 plugins
You'll wrap things up and then validate what you've learned in this course by taking an assessment.
What's included
1 reading1 assignment
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.






