Penetration Testing

Penetration Testing, also known as ethical hacking, is a practice of testing a computer system, network, or application to find security vulnerabilities that an attacker could exploit. Coursera's Penetration Testing catalogue equips you with the knowledge to identify, analyze, and address potential weaknesses in cybersecurity infrastructure. You'll learn about the leading methodologies and best practices in penetration testing, including network scanning, vulnerability scanning, system hacking, web application hacking, and social engineering. You'll also master the art of documenting, reporting, and providing recommendations to mitigate risks. As a learner, you'll gain hands-on experience in using various penetration testing tools and technologies, strengthening your cybersecurity skills and readiness for a career in cybersecurity.
30credentials
84courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "penetration testing"

  • Status: New
    Status: Free Trial

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Threat Detection, Data Encryption Standard, Threat Modeling, Cryptography, Cyber Attacks, Data Security, Databases, Malware Protection, Penetration Testing, Vulnerability Assessments, Application Security, Security Engineering, Authentications, Data Structures, Data Integrity, Artificial Intelligence, SQL

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cyber Security Assessment, Cybersecurity, Operating Systems, Malware Protection, Vulnerability Assessments, Security Controls, Intrusion Detection and Prevention, System Programming, Computer Architecture

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Threat Modeling, Cybersecurity, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Application Security, Threat Detection, Security Testing, Cyber Attacks, MITRE ATT&CK Framework, Exploit development, Encryption, Vulnerability Scanning, Web Applications, Infrastructure Security, Wireless Networks, Internet Of Things

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications

  • Skills you'll gain: Vulnerability Assessments, Cyber Security Assessment, Network Security, Metasploit, Penetration Testing, Network Administration, Software Installation, System Configuration, Web Applications, Authentications, Linux, Configuration Management

  • Skills you'll gain: Penetration Testing, Exploitation techniques, Network Security, Intrusion Detection and Prevention, Threat Detection, General Networking, Vulnerability Management, Linux, Linux Administration, Virtual Machines, Network Analysis

  • Status: New
    Status: Free Trial

    Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Incident Response, Cyber Threat Hunting, Cybersecurity, Cyber Threat Intelligence, DevSecOps, Cloud Security, Patch Management, Cyber Security Assessment, Exploitation techniques, Network Security, Computer Security Incident Management, Business Continuity, Cryptography, Responsible AI, Threat Modeling, Information Systems Security, DevOps, Disaster Recovery

  • Status: New

    Skills you'll gain: Open Web Application Security Project (OWASP), DevSecOps, Security Testing, CI/CD, DevOps, Application Security, Continuous Integration, Secure Coding, Continuous Delivery, Regulatory Compliance, Security Engineering, Vulnerability Assessments, Penetration Testing, Vulnerability Management, Compliance Auditing

  • Status: New
    Status: Free Trial

    Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Malware Protection, Cyber Security Assessment, Threat Detection, Penetration Testing, Threat Management, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security

  • Status: New

    Skills you'll gain: Threat Modeling, DevSecOps, Application Security, Security Requirements Analysis, Vulnerability Management, Threat Management, Security Testing, Secure Coding, Vulnerability Assessments, Penetration Testing, Security Awareness, Security Strategy, DevOps, Technology Roadmaps, Risk Management Framework, Software Development Life Cycle

Related roles

Gain the knowledge and skills you need to advance.

  • This role has a $119,168 median salary ¹.

    description:

    A Cyber Security Specialist monitors systems, responds to incidents, enforces policies, and protects data from unauthorized access and cyber threats.

    This role has a $119,168 median salary ¹.

    Offered by

    IBM_logo
    ISC2_logo
  • This role has a $116,480 median salary ¹.

    description:

    A Cyber Security Analyst monitors IT systems, analyzes threats, finds vulnerabilities, and implements measures to protect data from cyber attacks.

    This role has a $116,480 median salary ¹.

    Offered by

    Google_logo
    Microsoft_logo
    IBM_logo

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • EDUCBA
  • Pearson
  • IBM
  • Infosec
  • LearnQuest
  • LearnKartS
  • EC-Council