• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Cyber Exploitation


Results for "cyber+exploitation"


  • Status: Free Trial
    Free Trial
    C

    Cisco Learning and Certifications

    Cybersecurity Operations Fundamentals

    Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Intelligence, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Operating System Administration, Vulnerability Assessments, Threat Detection, Cybersecurity, Workflow Management

    4.8
    Rating, 4.8 out of 5 stars
    ·
    1.2K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Essentials for Forensics

    Skills you'll gain: Mobile Security, Criminal Investigation and Forensics, Investigation, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Attacks, Intrusion Detection and Prevention, Cybersecurity, Mobile Development, Cyber Security Policies, Network Security, Apple iOS, Event Monitoring, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Android (Operating System), Data Security, Threat Detection, Cyber Governance, Application Security

    4.5
    Rating, 4.5 out of 5 stars
    ·
    30 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Cybersecurity and Network Defense Fundamentals

    Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Pearson

    CompTIA Cybersecurity Analyst (CySA+) CS0-003

    Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Security Management, Cyber Threat Hunting, Information Systems Security, Threat Detection, Data Security, Network Security, Cyber Security Strategy, DevSecOps, Continuous Monitoring, Malware Protection, Cloud Security, Cyber Security Assessment, Risk Management Framework, Encryption, Authentications

    4.4
    Rating, 4.4 out of 5 stars
    ·
    18 reviews

    Intermediate · Specialization · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    EDUCBA

    Kali Linux: Ethical Hacking & Pentesting

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Brute-force attacks, Cryptography, Cybersecurity, Vulnerability Scanning, Intrusion Detection and Prevention, Data Import/Export, MySQL, Encryption, Network Security, Linux, Linux Administration

    4.8
    Rating, 4.8 out of 5 stars
    ·
    76 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    N

    New York University

    Introduction to Cyber Security

    Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cybersecurity, Cyber Security Strategy, Data Encryption Standard, Cyber Risk, Mobile Security, Enterprise Security, Computer Security, Application Security, Threat Detection, Cyber Security Policies

    4.7
    Rating, 4.7 out of 5 stars
    ·
    3.7K reviews

    Beginner · Specialization · 3 - 6 Months

What brings you to Coursera today?

  • Status: Free Trial
    Free Trial
    I

    IBM

    IBM Ethical Hacking with Open Source Tools

    Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Vulnerability Management, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Intrusion Detection and Prevention, Network Troubleshooting, Anomaly Detection, Information Systems Security, Cyber Security Policies, Network Analysis

    4.6
    Rating, 4.6 out of 5 stars
    ·
    176 reviews

    Intermediate · Professional Certificate · 3 - 6 Months

  • The Google AI Certificate that powers your career

    Enroll now
  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security Manager Certificate

    Skills you'll gain: Incident Response, Incident Management, Cyber Governance, Computer Security Incident Management, Cyber Risk, Cyber Security Strategy, Law, Regulation, and Compliance, Cyber Attacks, Security Management, Security Strategy, Security Awareness, Culture Transformation, Cyber Security Policies, Cyber Threat Intelligence, Intrusion Detection and Prevention, Mobile Security, Threat Detection, Cybersecurity, Cyber Operations, Cyber Security Assessment

    4.7
    Rating, 4.7 out of 5 stars
    ·
    32 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Essentials for Governance, Risk & Compliance

    Skills you'll gain: Incident Response, Threat Modeling, Cyber Governance, Computer Security Incident Management, Cyber Security Strategy, Cyber Attacks, Security Management, Threat Management, Cyber Risk, Cyber Security Policies, Cybersecurity, Cyber Threat Intelligence, Intrusion Detection and Prevention, Governance Risk Management and Compliance, Cyber Security Assessment, Cyber Operations, Compliance Management, Governance, Risk Management, Risk Control

    4.5
    Rating, 4.5 out of 5 stars
    ·
    13 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Data, Privacy and AI Security

    Skills you'll gain: AI Security, Information Privacy, Data Security, Responsible AI, Data Governance, Data Management, Cyber Risk, Data Sharing, Cyber Attacks, Cloud Security, Cyber Security Strategy, Data Loss Prevention, Cybersecurity, Data Integrity, Security Management, Security Controls, Security Awareness, Artificial Intelligence and Machine Learning (AI/ML), Cyber Operations, Data Science

    4.3
    Rating, 4.3 out of 5 stars
    ·
    22 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    Strategic Cyber Effects Management

    Skills you'll gain: Cyber Security Strategy, Cyber Operations, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cyber Security Assessment, Cyber Risk, Incident Response, Cyber Attacks, Campaign Management, Key Performance Indicators (KPIs), Risk Analysis, Performance Measurement, Resilience, Strategic Decision-Making, Business Metrics, Coordination, Strategic Marketing

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    Cyber Espionage and Counterintelligence

    Skills you'll gain: Endpoint Detection and Response, Threat Detection, MITRE ATT&CK Framework, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Modeling, Security Information and Event Management (SIEM), Cyber Security Strategy, Cyber Operations, Cybersecurity, Malware Protection, Incident Response, Data Loss Prevention, Anomaly Detection, Data Security, System Implementation, Open Source Technology

    Intermediate · Course · 1 - 3 Months

What brings you to Coursera today?

1234…9

In summary, here are 10 of our most popular cyber+exploitation courses

  • Cybersecurity Operations Fundamentals: Cisco Learning and Certifications
  • Cyber Security: Essentials for Forensics: Macquarie University
  • Cybersecurity and Network Defense Fundamentals: Edureka
  • CompTIA Cybersecurity Analyst (CySA+) CS0-003: Pearson
  • Kali Linux: Ethical Hacking & Pentesting: EDUCBA
  • Introduction to Cyber Security: New York University
  • IBM Ethical Hacking with Open Source Tools: IBM
  • Cyber Security Manager Certificate: Macquarie University
  • Cyber Security: Essentials for Governance, Risk & Compliance: Macquarie University
  • Cyber Security: Data, Privacy and AI Security: Macquarie University

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok