Penetration Testing

Penetration Testing, also known as ethical hacking, is a practice of testing a computer system, network, or application to find security vulnerabilities that an attacker could exploit. Coursera's Penetration Testing catalogue equips you with the knowledge to identify, analyze, and address potential weaknesses in cybersecurity infrastructure. You'll learn about the leading methodologies and best practices in penetration testing, including network scanning, vulnerability scanning, system hacking, web application hacking, and social engineering. You'll also master the art of documenting, reporting, and providing recommendations to mitigate risks. As a learner, you'll gain hands-on experience in using various penetration testing tools and technologies, strengthening your cybersecurity skills and readiness for a career in cybersecurity.
30credentials
1online degree
84courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "penetration testing"

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, C (Programming Language)

  • Status: New
    Status: Free Trial

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Security Testing, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Cryptography, Cybersecurity, Vulnerability Scanning, Hardening, Threat Detection, Data Import/Export, Public Key Infrastructure, MySQL, Linux, Linux Administration

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Mobile Security, Cyber Operations, Scripting, Android (Operating System), Command-Line Interface, Authentications, Network Analysis, Automation, Virtual Environment

  • Status: New
    Status: Free Trial

    Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, Public Key Infrastructure, MySQL, Vulnerability Scanning, Encryption, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL, PostgreSQL, Command-Line Interface

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Exploitation techniques, Security Testing, Vulnerability Assessments, Wireless Networks, Network Security, Linux Commands, Microsoft Windows, Cryptography, Operating Systems

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Malware Protection, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Threat Detection, Email Security, Vulnerability Assessments, Human Factors (Security), Network Analysis

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Hardening, Cybersecurity, Exploit development, Vulnerability Assessments, Network Analysis, Linux, System Configuration, Virtual Machines, Operating Systems

  • Status: New
    Status: Free Trial

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Cyber Security Assessment, Network Security, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis, Microsoft Windows

  • Status: New
    Status: Free Trial

    Skills you'll gain: Responsible AI, Incident Response, Application Security, Security Engineering, Threat Modeling, Cybersecurity, MLOps (Machine Learning Operations), Security Controls, Information Systems Security, Artificial Intelligence and Machine Learning (AI/ML), Security Strategy, Continuous Monitoring, Identity and Access Management, Cloud Security, Vulnerability Assessments, Hardening, Threat Detection, Artificial Intelligence, Penetration Testing, Machine Learning

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Metasploit, Safety Culture, Cyber Threat Hunting, Cyber Threat Intelligence, Cyber Security Assessment, Cybersecurity, Threat Detection, Generative AI, Security Testing, Vulnerability Scanning, Anomaly Detection, Data Security, Security Strategy, Network Security, Security Software, Change Management, Machine Learning Methods, Ethical Standards And Conduct, Data Visualization

  • Status: New

    Skills you'll gain: Exploit development, Penetration Testing, Cybersecurity, Ansible, Malware Protection, Incident Response, Infrastructure Security, Infrastructure as Code (IaC), Terraform, Cloud Computing, Virtualization, Virtual Machines, Amazon Web Services, Linux

  • Status: Free Trial

    Skills you'll gain: Building Codes, Construction, Laboratory Testing, Structural Engineering, Test Engineering, Laboratory Experience, Construction Engineering, Civil Engineering, Environmental Monitoring, Engineering Analysis, Virtual Environment, Experimentation, Research Reports, Structural Analysis, Analytical Testing, Engineering Practices, Penetration Testing, Engineering Calculations, Failure Analysis, Finite Element Methods

Related roles

Gain the knowledge and skills you need to advance.

  • This role has a $119,168 median salary ¹.

    description:

    A Cyber Security Specialist monitors systems, responds to incidents, enforces policies, and protects data from unauthorized access and cyber threats.

    This role has a $119,168 median salary ¹.

    Offered by

    IBM_logo
    ISC2_logo
  • This role has a $116,480 median salary ¹.

    description:

    A Cyber Security Analyst monitors IT systems, analyzes threats, finds vulnerabilities, and implements measures to protect data from cyber attacks.

    This role has a $116,480 median salary ¹.

    Offered by

    Google_logo
    Microsoft_logo
    IBM_logo

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • EDUCBA
  • Pearson
  • IBM
  • Infosec
  • LearnQuest
  • LearnKartS
  • EC-Council