By the end of this course, learners will be able to identify, execute, and defend against backdoor exploits, privilege escalation, spoofing, redirection, and denial-of-service attacks. They will analyze techniques using Meterpreter, command prompt, DNS spoofing, DHCP manipulation, ICMP redirection, and advanced DDoS strategies.

Ethical Hacking: Meterpreter, DNS & ICMP Attacks

Ethical Hacking: Meterpreter, DNS & ICMP Attacks
This course is part of Kali Linux: Ethical Hacking & Pentesting Specialization

Instructor: EDUCBA
Access provided by Cambia Health Solutions
15 reviews
What you'll learn
Identify and simulate backdoors, privilege escalation, and spoofing.
Apply tools like Meterpreter, John the Ripper, and EvilGrade.
Execute and defend against MITM, redirection, and DDoS attacks.
Skills you'll gain
Tools you'll learn
Details to know

Add to your LinkedIn profile
12 assignments
October 2025
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Learner reviews
- 5 stars
86.66%
- 4 stars
6.66%
- 3 stars
0%
- 2 stars
0%
- 1 star
6.66%
Showing 3 of 15
Reviewed on Mar 2, 2026
This course goes beyond theory and focuses on real tools and attack techniques. It’s perfect for building practical skills in ethical hacking and network security.
Reviewed on Feb 10, 2026
Overall, it delivers a very positive and satisfying learning experience.
Reviewed on Feb 4, 2026
Well-organized content and step-by-step explanations make this course highly effective.





