• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Exploits

Results for "exploits"


  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Detect & Respond to Mobile AI Threats

    Skills you'll gain: Mobile Security, AI Security, Threat Detection, Security Controls, Exploit development, Threat Modeling, Hardening, Threat Management, Endpoint Security, Artificial Intelligence, Mobile Development Tools, Deep Learning, Incident Response, Information Privacy

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Cyber Threats and Network Security Foundations

    Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Threat Modeling, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, Cyber Attacks, Hardening, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Preview
    Preview
    C

    Coursera

    Security Essentials for Modern Developers

    Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, Vulnerability Scanning, Continuous Deployment

    Advanced · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    EDUCBA

    Python Hacking: Apply, Implement & Analyze

    Skills you'll gain: Encryption, Secure Coding, File Management, Cryptography, Python Programming, Programming Principles, Debugging, Scripting, Software Testing, Data Structures

    4.8
    Rating, 4.8 out of 5 stars
    ·
    13 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Pearson

    Certified Ethical Hacker (CEH): Unit 2

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Network Security, Network Analysis, Network Protocols, Open Source Technology

    4.6
    Rating, 4.6 out of 5 stars
    ·
    7 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Execution, persistence, privilege escalation and evasion

    Skills you'll gain: Cybersecurity, Cyber Operations, Data Persistence, Exploitation techniques, Persistence, Intrusion Detection and Prevention, Scripting, Python Programming, Microsoft Windows

    4.6
    Rating, 4.6 out of 5 stars
    ·
    96 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of London

    Introduction to Network Security

    Skills you'll gain: Network Security, IT Security Architecture, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Threat Detection

    4.9
    Rating, 4.9 out of 5 stars
    ·
    33 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Pearson

    Certified Ethical Hacker (CEH): Unit 5

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Web Applications, Penetration Testing, Application Security, Security Controls, Vulnerability Assessments, Application Programming Interface (API), Exploitation techniques, Web Servers, Cloud Security, SQL

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Web Hacker's Toolbox - Tools Used by Successful Hackers

    Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Application Security, Exploitation techniques, Vulnerability Assessments, Test Tools, Web Applications, SQL, Databases

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Intermediate Ethical Hacking Techniques

    Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL

    3.8
    Rating, 3.8 out of 5 stars
    ·
    8 reviews

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Cyber Secure Coder (CSC-110)

    Skills you'll gain: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cybersecurity, Security Requirements Analysis, Security Testing, Vulnerability Assessments, Code Review, Software Design, Encryption, Vulnerability Management, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring, Authorization (Computing)

    5
    Rating, 5 out of 5 stars
    ·
    6 reviews

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    Web Application Security Testing with Google Hacking

    Skills you'll gain: Security Testing, Vulnerability Scanning, Secure Coding, Data Security, Application Security, Cyber Security Assessment, Vulnerability Assessments, Web Applications, Web Servers, Information Privacy, SQL

    Intermediate · Course · 1 - 3 Months

Searches related to exploits

advanced web exploits, python scripting & network attacks
exploit development
exploit
exploit development, malware, & defensive strategies
web exploit
1…78910

In summary, here are 10 of our most popular exploits courses

  • Detect & Respond to Mobile AI Threats: Coursera
  • Cyber Threats and Network Security Foundations: Edureka
  • Security Essentials for Modern Developers: Coursera
  • Python Hacking: Apply, Implement & Analyze: EDUCBA
  • Certified Ethical Hacker (CEH): Unit 2: Pearson
  • Execution, persistence, privilege escalation and evasion: Infosec
  • Introduction to Network Security: University of London
  • Certified Ethical Hacker (CEH): Unit 5: Pearson
  • Web Hacker's Toolbox - Tools Used by Successful Hackers: Packt
  • Intermediate Ethical Hacking Techniques: Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok