Pearson
Certified Ethical Hacker (CEH): Unit 3
Pearson

Certified Ethical Hacker (CEH): Unit 3

Pearson

Instructor: Pearson

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

3 hours to complete
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

3 hours to complete
Flexible schedule
Learn at your own pace

What you'll learn

  • Conduct thorough vulnerability analysis to identify and prioritize system weaknesses.

  • Master system hacking techniques, including privilege escalation and command execution.

  • Understand and counteract various malware threats, including APTs and fileless malware.

  • Develop strategies to enhance cybersecurity defenses and protect digital environments.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

July 2025

Assessments

3 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Build your subject-matter expertise

This course is part of the Certified Ethical Hacker (CEH) Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate

There is 1 module in this course

In this module, you will explore the core phases and techniques used by both malicious and ethical hackers to compromise systems. Your goal is to understand these techniques to better defend against them and improve the overall security of your environment. You'll focus on three critical areas. First, delve into vulnerability analysis, where you take information gathered during reconnaissance to identify weaknesses in the target system. Next, explore system hacking, often considered the most exciting part of ethical hacking, where you put your skills to the test and learn various techniques to demonstrate how an attacker can compromise a system. Finally, discuss malware threats, one of the most prevalent and dangerous tools in a hacker's arsenal. Understanding how malware works is crucial for developing effective defensive techniques against these threats.

What's included

27 videos3 assignments

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Pearson
Pearson
146 Courses63 learners

Offered by

Pearson

Explore more from Security

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions