Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "exploitation techniques"
Status: NewStatus: Free TrialSkills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Vulnerability Management, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Network Troubleshooting, Anomaly Detection, Information Systems Security, Cyber Security Policies, Network Analysis
Status: NewStatus: Free TrialSkills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Security Testing, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Cryptography, Cybersecurity, Vulnerability Scanning, Hardening, Threat Detection, Data Import/Export, Public Key Infrastructure, MySQL, Linux, Linux Administration
Status: NewStatus: Free TrialSkills you'll gain: Penetration Testing, Exploitation techniques, Security Testing, Vulnerability Assessments, Wireless Networks, Network Security, Linux Commands, Microsoft Windows, Cryptography, Operating Systems
Status: NewStatus: Free TrialSkills you'll gain: Sales Enablement, Sales Management, Sales, Customer Analysis, Governance, Sales Strategy, General Sales Practices, Talent Management, Competitive Analysis, Marketing, Sales Operations, Target Market, Selling Techniques, Verbal Communication Skills, Persuasive Communication, Sales Training, Oral Expression, Market Share, Sales Process, Business
Status: NewStatus: PreviewStarweaver
Skills you'll gain: MITRE ATT&CK Framework, Cyber Operations, Threat Modeling, Cyber Security Strategy, Cyber Threat Intelligence, Penetration Testing, Cybersecurity, Exploitation techniques, Threat Detection, Vulnerability Assessments, Human Factors (Security), Security Awareness, Security Testing, Network Security, Generative AI
Status: NewStatus: Free TrialSkills you'll gain: Penetration Testing, Malware Protection, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Threat Detection, Email Security, Vulnerability Assessments, Human Factors (Security), Network Analysis
What brings you to Coursera today?
Status: Free TrialLearnKartS
Skills you'll gain: Penetration Testing, Network Security, Cryptography, Endpoint Security, GitLab, Virtual Machines, GitHub, Network Protocols
Status: NewStatus: Free TrialSkills you'll gain: Penetration Testing, Vulnerability Scanning, Hardening, Cybersecurity, Exploit development, Vulnerability Assessments, Network Analysis, Linux, System Configuration, Virtual Machines, Operating Systems
Status: NewStatus: Free TrialSkills you'll gain: Encryption, Secure Coding, File Management, Cryptography, Python Programming, Programming Principles, Debugging, Scripting, Data Structures
Status: NewStatus: Free TrialSkills you'll gain: Penetration Testing, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Mobile Security, Cyber Operations, Scripting, Android (Operating System), Command-Line Interface, Authentications, Network Analysis, Automation, Virtual Environment
Status: NewStatus: Free TrialSkills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Cyber Security Assessment, Network Security, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis, Microsoft Windows
Status: NewStatus: Free TrialFractal Analytics
Skills you'll gain: Data Governance, Data Strategy, Data Ethics, Responsible AI, Data Management, Data Architecture, Metadata Management, Data Store, Data Loss Prevention, Data Security, Interoperability, Docker (Software), Data Storage, Data Processing, Semantic Web, Generative AI Agents, Real Time Data, Large Language Modeling, Machine Learning, Agentic systems
Searches related to exploitation techniques
In summary, here are 10 of our most popular exploitation techniques courses
- IBM Ethical Hacking with Open Source Tools:Â IBM
- Kali Linux: Ethical Hacking & Pentesting:Â EDUCBA
- Ethical Hacking with Kali Linux: Analyze & Apply:Â EDUCBA
- Sales Foundations 101: Core Techniques for Success:Â EDUCBA
- Offensive Cyber Operations:Â Starweaver
- Ethical Hacking with Kali Linux: Analyze & Defend:Â EDUCBA
- Ethical Hacking:Â LearnKartS
- Ethical Hacking with Kali Linux: Learn & Secure:Â EDUCBA
- Python Hacking: Apply, Implement & Analyze:Â EDUCBA
- Advanced Penetration Testing with Kali Linux:Â EDUCBA










