Learners will be able to explain and demonstrate Metasploit commands, analyze and apply exploits and payloads, evaluate SQL injection techniques, differentiate and apply cryptographic methods, analyze hash vulnerabilities, and demonstrate secure database management practices.

Ethical Hacking with Metasploit, SQL & Crypto

Ethical Hacking with Metasploit, SQL & Crypto
This course is part of Kali Linux: Ethical Hacking & Pentesting Specialization

Instructor: EDUCBA
Access provided by Justice Through Code at Columbia University
16 reviews
What you'll learn
Apply Metasploit commands, exploits, and payloads in Kali Linux.
Perform SQL injection with manual, dork, and sqlmap techniques.
Analyze cryptographic methods, hash flaws, and DB security.
Skills you'll gain
Tools you'll learn
Details to know

Add to your LinkedIn profile
8 assignments
October 2025
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Learner reviews
- 5 stars
88.23%
- 4 stars
5.88%
- 3 stars
0%
- 2 stars
5.88%
- 1 star
0%
Showing 3 of 16
Reviewed on Feb 16, 2026
The pacing is perfect, and the overall presentation keeps the learner engaged from start to finish.
Reviewed on Feb 24, 2026
Covers important tools and attack methods in a well-structured way.
Reviewed on Feb 19, 2026
Clear explanations with hands-on examples make ethical hacking concepts easy to understand.





