This course covers ethical hacking, with a focus on vulnerability analysis, system hacking, and malware threats. You will learn to identify, assess, and prioritize vulnerabilities in systems and networks, a critical skill for preventing security breaches. You will learn about system hacking and explore techniques for gaining access, escalating privileges, and maintaining control over compromised systems. You will develop a strong understanding of malware threats, including advanced persistent threats and fileless malware, and learn how to implement effective countermeasures. By the end of this course, you will be proficient in using ethical hacking techniques to enhance the security of digital infrastructures.



Certified Ethical Hacker (CEH): Unit 3
This course is part of Certified Ethical Hacker (CEH) Specialization

Instructor: Pearson
Included with
Recommended experience
What you'll learn
Conduct thorough vulnerability analysis to identify and prioritize system weaknesses.
Master system hacking techniques, including privilege escalation and command execution.
Understand and counteract various malware threats, including APTs and fileless malware.
Develop strategies to enhance cybersecurity defenses and protect digital environments.
Skills you'll gain
Details to know

Add to your LinkedIn profile
July 2025
3 assignments
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There is 1 module in this course
In this module, you will explore the core phases and techniques used by both malicious and ethical hackers to compromise systems. Your goal is to understand these techniques to better defend against them and improve the overall security of your environment. You'll focus on three critical areas. First, delve into vulnerability analysis, where you take information gathered during reconnaissance to identify weaknesses in the target system. Next, explore system hacking, often considered the most exciting part of ethical hacking, where you put your skills to the test and learn various techniques to demonstrate how an attacker can compromise a system. Finally, discuss malware threats, one of the most prevalent and dangerous tools in a hacker's arsenal. Understanding how malware works is crucial for developing effective defensive techniques against these threats.
What's included
27 videos3 assignments
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Explore more from Security
Why people choose Coursera for their career





Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
More questions
Financial aid available,