More to explore:

All Results

  • Skills you'll gain: Exploit development, Penetration Testing, Exploitation techniques, Scripting, Brute-force attacks, Scripting Languages, Shell Script, Python Programming, Program Development, Network Protocols, Data Persistence, Software Installation

  • Skills you'll gain: Penetration Testing, Exploit development, OSI Models, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Network Protocols, Network Security, Cyber Security Assessment, General Networking, Vulnerability Scanning, Cybersecurity, Prompt Engineering, Large Language Modeling, AI Security, LLM Application, Test Script Development, Scripting, Scripting Languages, Python Programming

  • Skills you'll gain: Network Analysis, Network Security, Cyber Operations, Intrusion Detection and Prevention, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Penetration Testing, Anomaly Detection, Exploitation techniques, Brute-force attacks, Scripting, Network Protocols, Authentications, Scripting Languages, Python Programming, Data Access, Identity and Access Management, Automation

  • Skills you'll gain: Exploit development, Penetration Testing, Cyber Operations, Malware Protection, Exploitation techniques, Network Monitoring, Object Oriented Programming (OOP), Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting Languages, Scripting, Remote Access Systems, Python Programming, Program Development, Command-Line Interface, Code Reusability, Package and Software Management

  • Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Human Factors (Security), Information Systems Security, Data Persistence

  • Skills you'll gain: Bash (Scripting Language), Shell Script, Unix Shell, Scripting, Scripting Languages, Linux Commands, Unix Commands, Linux, Command-Line Interface, Code Reusability, User Interface (UI), Graphical Tools

What brings you to Coursera today?

  • Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript

  • Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Exploitation techniques, Hardening, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Business Logic, Cloud Security, API Testing, Wireless Networks, Data Persistence, Application Programming Interface (API)

  • Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Exploit development, Vulnerability Scanning, Exploitation techniques, Security Testing, Vulnerability Assessments, Hardening, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL

  • Johns Hopkins University

    Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Exploitation techniques, Mobile Security, Vulnerability Scanning, Cybersecurity, Security Testing, Application Security, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Network Protocols

  • Skills you'll gain: Web Scraping, Git (Version Control System), Test Script Development, Scripting, Version Control, Test Automation, IT Automation, Email Automation, Test Tools, Software Testing, Cloud API, Scripting Languages, Automation, Restful API, Application Programming Interface (API), Data Ethics, Scalability, Python Programming, File I/O, Productivity

  • Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Security Strategy, Vulnerability Scanning, Security Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Exploitation techniques, Java, Security Controls, Java Programming, Patch Management, Dependency Analysis, Docker (Software)