This Specialization is designed for post-graduate students aiming to develop ethical hacking skills. Through three comprehensive courses, you will explore methodologies, penetration testing techniques, and the MITRE ATT&CK framework, preparing you to effectively assess and enhance cybersecurity measures. By the end, you will be equipped to conduct thorough security evaluations and understand hacker behaviors, empowering you to make a significant impact in the cybersecurity industry.

Discover new skills with $120 off courses from industry experts. Save now.


Introduction to Ethical Hacking Specialization
Unlock Your Path to Ethical Hacking Mastery. Master ethical hacking methodologies and tools to enhance cybersecurity effectiveness.

Instructor: Jason Crossland
Included with
(10 reviews)
Recommended experience
(10 reviews)
Recommended experience
What you'll learn
Apply ethical hacking methodologies and frameworks, including the Penetration Testing Execution Standard (PTES).
Identify and exploit vulnerabilities in mobile devices, networks, and web applications through hands-on labs.
Understand cryptography and Public Key Infrastructure (PKI) to enhance security measures and counter cryptographic attacks.
Create detailed penetration testing reports and executive summaries to effectively communicate findings to stakeholders.
Overview
Skills you'll gain
What’s included

Add to your LinkedIn profile
Advance your subject-matter expertise
- Learn in-demand skills from university and industry experts
- Master a subject or tool with hands-on projects
- Develop a deep understanding of key concepts
- Earn a career certificate from Johns Hopkins University

Specialization - 3 course series
What you'll learn
Conduct penetration tests using industry-standard methodologies like PTES.
Craft professional penetration testing reports and executive summaries.
Understand and apply cryptographic principles, including PKI and secret key encryption.
Master social engineering and analyze cyberattacks with the MITRE ATT&CK Framework.
Skills you'll gain
What you'll learn
Learn to identify and exploit vulnerabilities in mobile devices, networks, and web applications.
Master the use of ethical hacking frameworks to systematically assess and mitigate security threats.
Develop effective countermeasures to mitigate DNS, Wi-Fi, and protocol-based cyberattacks.
Skills you'll gain
What you'll learn
Defend against rootkits, OS vulnerabilities, and buffer overflow attacks.
Identify and exploit race conditions while implementing mitigation strategies.
Apply post-exploitation techniques, including privilege escalation and pivoting.
Skills you'll gain
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career





Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
This course is completely online, so there’s no need to show up to a classroom in person. You can access your lectures, readings and assignments anytime and anywhere via the web or your mobile device.
If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.
Yes! To get started, click the course card that interests you and enroll. You can enroll and complete the course to earn a shareable certificate. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. Visit your learner dashboard to track your progress.
More questions
Financial aid available,