In this course, you will delve into the world of password cracking and security, learning essential techniques used by cybersecurity professionals. With tools like John the Ripper and Hashcat, you’ll gain hands-on experience in breaking password protections and understanding password vulnerabilities. This skill is critical in identifying security flaws and strengthening your defenses in a professional setting.

Ethical Password Cracking

Ethical Password Cracking

Instructor: Packt - Course Instructors
Access provided by Cambia Health Solutions
Recommended experience
What you'll learn
Understand the principles of password security and storage
Discover how to identify and extract password hashes from different systems
Learn to apply dictionary and brute-force attacks effectively
Skills you'll gain
- Network Security
- Authentications
- Brute-force attacks
- Blockchain
- Drupal
- Penetration Testing
- Wireless Networks
- Vulnerability Assessments
- Data Security
- Data Storage
- Cyber Attacks
- Linux
- Encryption
- Cybersecurity
- Mac OS
- Skills section collapsed. Showing 13 of 15 skills.
Details to know

Add to your LinkedIn profile
11 assignments
January 2026
See how employees at top companies are mastering in-demand skills

There are 11 modules in this course
This section covers password-cracking methods, storage techniques, and security risks. Learn how to protect systems from unauthorized access.
What's included
2 videos3 readings1 assignment
In this section, we explore how OSINT aids password cracking by identifying compromised credentials and generating password candidates from public data sources.
What's included
1 video2 readings1 assignment
In this section, we install and configure John the Ripper and hashcat for password cracking, emphasizing their roles in credential recovery and the use of wordlists for effective attacks.
What's included
1 video2 readings1 assignment
In this section, we explore how to enhance password cracking efficiency using rules. Key concepts include analyzing complexity, applying John and hashcat rules for improved credential recovery.
What's included
1 video3 readings1 assignment
This section covers password hash collection and cracking on Windows and macOS for security assessments.
What's included
1 video1 reading1 assignment
In this section, we explore techniques for collecting, formatting, and cracking Linux password hashes. Key concepts include secure handling of sensitive data and practical applications for system security assessments.
What's included
1 video1 reading1 assignment
This section covers WPA/WPA2 architecture, capturing traffic, and cracking passphrases using aircrack-ng.
What's included
1 video3 readings1 assignment
This section covers password hash collection and cracking for WordPress, Drupal, and Webmin.
What's included
1 video1 reading1 assignment
This section covers methods to recover password vault passphrases using recovery kits and user clues.
What's included
1 video3 readings1 assignment
This section covers passphrase cracking for cryptocurrency wallets, including Bitcoin, Litecoin, and Ethereum.
What's included
1 video2 readings1 assignment
In this section, we explore methods to improve password security, including implementing policies, designing user guidelines, and analyzing hashing algorithms to resist cracking attacks.
What's included
1 video1 reading1 assignment
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.






