By the end of this course, learners will be able to identify, execute, and defend against backdoor exploits, privilege escalation, spoofing, redirection, and denial-of-service attacks. They will analyze techniques using Meterpreter, command prompt, DNS spoofing, DHCP manipulation, ICMP redirection, and advanced DDoS strategies.

Ethical Hacking: Meterpreter, DNS & ICMP Attacks

Ethical Hacking: Meterpreter, DNS & ICMP Attacks
This course is part of Kali Linux: Ethical Hacking & Pentesting Specialization

Instructor: EDUCBA
Access provided by American University of Bahrain
15 reviews
What you'll learn
Identify and simulate backdoors, privilege escalation, and spoofing.
Apply tools like Meterpreter, John the Ripper, and EvilGrade.
Execute and defend against MITM, redirection, and DDoS attacks.
Skills you'll gain
Tools you'll learn
Details to know

Add to your LinkedIn profile
12 assignments
October 2025
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Learner reviews
- 5 stars
86.66%
- 4 stars
6.66%
- 3 stars
0%
- 2 stars
0%
- 1 star
6.66%
Showing 3 of 15
Reviewed on Feb 22, 2026
This course provides strong foundational knowledge of ethical hacking and real-world network attack methods.
Reviewed on Feb 25, 2026
This course is very informative and easy to understand.
Reviewed on Feb 16, 2026
This course provides strong foundational knowledge of ethical hacking and real-world network attack methods.





