Exploit development

Exploit development is a critical skill in offensive cybersecurity that involves creating or modifying code to exploit security flaws in systems, services, or applications. Coursera's Exploit Development catalogue teaches you how to identify vulnerabilities, analyze root causes, and develop working exploits for various security weaknesses. You'll learn to create proof-of-concept exploits, integrate payloads, and apply stabilization and evasion techniques for common exploit types such as buffer overflows, use-after-free vulnerabilities, format string bugs, and command injections. Mastering exploit development empowers cybersecurity professionals to think like attackers, conduct advanced penetration tests, and contribute to vulnerability research, making it an essential skill for ethical hackers, red team operators, and security researchers in today's evolving threat landscape.
9credentials
22courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "exploit development"

  • Status: New
    Status: Free Trial

    Skills you'll gain: Exploit development, Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cyber Security Assessment, Intrusion Detection and Prevention, Network Security, Network Protocols, Network Analysis, Scripting, Remote Access Systems, Python Programming, Command-Line Interface

  • Status: New
    Status: Free Trial

    Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Vulnerability Management, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Network Troubleshooting, Anomaly Detection, Information Systems Security, Cyber Security Policies, Network Analysis

  • Status: Free Trial

    Skills you'll gain: Blockchain, Loans, FinTech, Lending and Underwriting, Cyber Risk, Operational Risk, Scalability, Regulatory Compliance, Interoperability, Commercial Lending, Payment Systems, Financial Inclusion, Legal Risk, Exploit development, Derivatives, Key Management, Cryptography, Finance, Entrepreneurial Finance, Entrepreneurship

  • Status: New

    Skills you'll gain: Exploit development, Penetration Testing, Cybersecurity, Ansible, Malware Protection, Incident Response, Infrastructure Security, Infrastructure as Code (IaC), Terraform, Cloud Computing, Virtualization, Virtual Machines, Amazon Web Services, Linux

  • Status: Free Trial

    Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Exploit development, Cybersecurity, Network Security, System Monitoring, Cyber Operations, Continuous Monitoring, Cyber Threat Intelligence, Exploitation techniques, Scripting, IT Automation, Network Monitoring, Command-Line Interface, Persistence, Python Programming, Data Access, Computer Programming

  • Status: New
    Status: Free Trial

    Skills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, Exploit development, Intrusion Detection and Prevention, System Configuration, Virtual Machines

What brings you to Coursera today?

  • Status: Free Trial

    Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Hardening, Cybersecurity, Exploit development, Vulnerability Assessments, Network Analysis, Linux, System Configuration, Virtual Machines, Operating Systems

  • Status: New
    Status: Free Trial

    Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Cyber Attacks, Wireless Networks, Application Security, Network Monitoring, Linux, Object Oriented Programming (OOP), Vulnerability Assessments, Cyber Security Assessment, Intrusion Detection and Prevention

  • Status: Preview

    Skills you'll gain: Malware Protection, Exploit development, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Virtual Machines, Debugging, System Programming, Scripting, Windows PowerShell, Computer Architecture, Excel Macros, Linux, File Management

  • Status: New
    Status: Free Trial

    Skills you'll gain: Threat Modeling, Security Testing, Security Engineering, Cybersecurity, Data Security, Blockchain, Threat Detection, Cryptography, Network Security, Security Strategy, Exploit development, Vulnerability Assessments, Transaction Processing, Regulation and Legal Compliance

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Computer Security Incident Management, Metasploit, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Exploit development, Cloud Security, Security Strategy, Computer Security Awareness Training, Risk Management, Enterprise Security