Penetration Testing

Penetration Testing, also known as ethical hacking, is a practice of testing a computer system, network, or application to find security vulnerabilities that an attacker could exploit. Coursera's Penetration Testing catalogue equips you with the knowledge to identify, analyze, and address potential weaknesses in cybersecurity infrastructure. You'll learn about the leading methodologies and best practices in penetration testing, including network scanning, vulnerability scanning, system hacking, web application hacking, and social engineering. You'll also master the art of documenting, reporting, and providing recommendations to mitigate risks. As a learner, you'll gain hands-on experience in using various penetration testing tools and technologies, strengthening your cybersecurity skills and readiness for a career in cybersecurity.
30credentials
84courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "penetration testing"

  • Status: Free Trial

    Skills you'll gain: Identity and Access Management, Business Continuity, Network Security, Cryptography, AWS Identity and Access Management (IAM), Encryption, User Provisioning, Security Management, Penetration Testing, Vulnerability Scanning, ISO/IEC 27001, Threat Management, Network Performance Management, Information Systems Security, Network Architecture, DevSecOps, Cyber Operations, Data Management, Software Development Methodologies, Cybersecurity

  • Status: Free Trial

    Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, System Testing, Threat Detection, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Windows PowerShell, Command-Line Interface

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers

  • Status: New
    Status: Free Trial

    Skills you'll gain: Business Risk Management, Risk Management, Cyber Governance, Penetration Testing, Personally Identifiable Information, Information Privacy, Vendor Management, Governance Risk Management and Compliance, Security Management, Cyber Risk, Vulnerability Assessments, Cyber Security Policies, Security Strategy, Compliance Management, Cybersecurity, Regulatory Requirements, Security Controls, Security Awareness

  • Status: Free Trial

    Universidad de los Andes

    Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Cryptography, Security Requirements Analysis, Penetration Testing, Information Systems Security, Cybersecurity, Threat Detection, Cloud Security, Vulnerability Assessments, Threat Modeling, IT Management, Encryption, Vulnerability Management, Exploitation techniques, Data Security, Security Management, Personally Identifiable Information

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Metasploit, Safety Culture, Cyber Threat Hunting, Cyber Threat Intelligence, Cyber Security Assessment, Cybersecurity, Threat Detection, Generative AI, Security Testing, Vulnerability Scanning, Anomaly Detection, Data Security, Security Strategy, Network Security, Security Software, Change Management, Machine Learning Methods, Ethical Standards And Conduct, Data Visualization

  • Status: Free Trial

    Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security

  • Status: Free Trial

    Skills you'll gain: Building Codes, Construction, Laboratory Testing, Structural Engineering, Test Engineering, Laboratory Experience, Construction Engineering, Civil Engineering, Environmental Monitoring, Engineering Analysis, Virtual Environment, Experimentation, Research Reports, Structural Analysis, Analytical Testing, Engineering Practices, Penetration Testing, Engineering Calculations, Failure Analysis, Finite Element Methods

  • Status: New
    Status: Free Trial

    Skills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Security Controls, Threat Detection, Threat Modeling, Endpoint Detection and Response

  • Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Development, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript

  • Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Virtual Machines, Technical Documentation, Microsoft Windows, Windows PowerShell, Linux Commands, Command-Line Interface, Software Installation

  • Skills you'll gain: Penetration Testing, Exploitation techniques, Cybersecurity, Vulnerability Assessments, Vulnerability Scanning, Linux, Operating System Administration, Command-Line Interface, Linux Commands, Cryptography, File Management, Virtual Environment, Microsoft Windows, Scripting

Related roles

Gain the knowledge and skills you need to advance.

  • This role has a $119,168 median salary ¹.

    description:

    A Cyber Security Specialist monitors systems, responds to incidents, enforces policies, and protects data from unauthorized access and cyber threats.

    This role has a $119,168 median salary ¹.

    Offered by

    IBM_logo
    ISC2_logo
  • This role has a $116,480 median salary ¹.

    description:

    A Cyber Security Analyst monitors IT systems, analyzes threats, finds vulnerabilities, and implements measures to protect data from cyber attacks.

    This role has a $116,480 median salary ¹.

    Offered by

    Google_logo
    Microsoft_logo
    IBM_logo

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • EDUCBA
  • Pearson
  • IBM
  • Infosec
  • LearnQuest
  • LearnKartS
  • EC-Council