Unlock the intricacies of advanced network attacks, web hacking, and cryptography in this comprehensive course designed for cybersecurity enthusiasts and professionals. You’ll gain expertise in identifying and mitigating session hijacking, evading firewalls and IDS, and exploiting web vulnerabilities, ensuring a holistic understanding of modern attack surfaces.
![Packt](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/http://coursera-university-assets.s3.amazonaws.com/fa/3b9b5304c24cf4aa64054631ee946c/360-360-square.png?auto=format%2Ccompress&dpr=1&w=28&h=28)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/1a4589dccee10648821b7ea23e5fca9a.png?auto=format%2Ccompress&dpr=1&q=80)
![Packt](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/http://coursera-university-assets.s3.amazonaws.com/c7/391d0e5f6a4d648dc4f754c5898df7/2.png?auto=format%2Ccompress&dpr=1&h=45)
Advanced Network Attacks, Web Hacking, and Cryptography
This course is part of Certified Ethical Hacker (CEH) v.12 Specialization
![Packt - Course Instructors](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-instructor-photos.s3.amazonaws.com/2b/9c92f373414941b4a0bbda577bd627/profile.jpg?auto=format%2Ccompress&dpr=1&w=75&h=75&fit=crop)
Instructor: Packt - Course Instructors
Included with
Recommended experience
Recommended experience
What you'll learn
Master techniques for session hijacking, network-level attacks, and application vulnerabilities.
Implement web application defenses against OWASP Top 10 vulnerabilities.
Explore SQL injection, wireless hacking, and cryptographic attack methodologies.
Defend mobile platforms, IoT systems, and cloud environments with effective countermeasures.
Details to know
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/31ebcba3851b87d1d8609abf15d0ff7e.png?auto=format%2Ccompress&dpr=1&w=24&h=24)
Add to your LinkedIn profile
February 2025
11 assignments
See how employees at top companies are mastering in-demand skills
![Placeholder](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/74c8747e8210831049cf88dd4eefe26c.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=320)
![logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/74c8747e8210831049cf88dd4eefe26c.png?auto=format%2Ccompress&dpr=1&w=320&h=70&q=40)
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
![Placeholder](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/a7c5400e51272c78b710ce9b56fd3178.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=562)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/a7c5400e51272c78b710ce9b56fd3178.png?auto=format%2Ccompress&dpr=1&w=562&h=221&q=40&fit=crop)
![Placeholder](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/de1a6556fbe605411e8c1c2ca4ba45f1.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=259)
![Coursera Career Certificate](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/de1a6556fbe605411e8c1c2ca4ba45f1.png?auto=format%2Ccompress&dpr=1&w=259&h=165&q=40)
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
![Placeholder](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/de1a6556fbe605411e8c1c2ca4ba45f1.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=333)
![Coursera Career Certificate](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/de1a6556fbe605411e8c1c2ca4ba45f1.png?auto=format%2Ccompress&dpr=1&w=333&h=215&q=40)
There are 10 modules in this course
In this module, we will delve into session hijacking, a critical technique used to intercept trusted communications between systems. You will explore both network-level and application-level attacks, examining how attackers exploit vulnerabilities to hijack sessions. The module concludes with a focus on countermeasures, offering strategies to secure sessions and protect against these threats.
What's included
4 videos2 readings1 assignment
In this module, we will uncover the techniques attackers use to evade critical security mechanisms like firewalls and intrusion detection/prevention systems (IDS/IPS). You’ll also explore the concept of honeypots, learning how they can be used to detect, analyze, and counteract attacks. This module equips you with both offensive and defensive perspectives for navigating modern network defenses.
What's included
3 videos1 assignment
In this module, we will focus on understanding and exploiting vulnerabilities in web servers. You will learn about common attack methods and how to follow a systematic hacking methodology to identify and exploit weaknesses. Additionally, the module emphasizes strategies for securing web servers against such attacks.
What's included
3 videos1 assignment
In this module, we will delve into the intricate workings of web applications, emphasizing their vulnerabilities and risks. You’ll explore common attack types, including Cross-Site Scripting, CSRF, and IDOR, while also learning to exploit Local and Remote File Inclusion vulnerabilities. This module combines theory and practical methodologies to enhance your ethical hacking skillset.
What's included
9 videos1 assignment
In this module, we will explore the devastating potential of SQL Injection attacks, a critical web application vulnerability. You’ll learn how to execute and automate these attacks using tools like SQLMap, and understand how to exploit SQL Injection to access databases, filesystems, and even shells. The module concludes with best practices for securing systems against these attacks.
What's included
5 videos1 assignment
In this module, we will uncover the unique vulnerabilities of wireless networks and demonstrate how attackers exploit them. You will explore tools and techniques for hacking Wi-Fi systems and learn about effective countermeasures to secure wireless communication. By understanding both offensive and defensive perspectives, you’ll enhance your expertise in wireless network security.
What's included
5 videos1 assignment
In this module, we will explore the vulnerabilities and risks unique to mobile platforms. You will learn to assess and exploit weaknesses in Android and iOS devices while understanding how to secure these systems using MDM. This module prepares you to address the growing security challenges in mobile environments.
What's included
4 videos1 assignment
In this module, we will examine the growing landscape of IoT and OT devices, focusing on their vulnerabilities and security challenges. You will gain hands-on experience with tools and techniques for targeting IoT/OT systems and learn to deploy effective countermeasures. This module bridges the gap between traditional IT security and emerging technology threats.
What's included
5 videos1 assignment
In this module, we will explore the fundamentals of cloud computing and its unique security considerations. You’ll learn to identify vulnerabilities in cloud services and containerized environments, understand common hacking tools, and implement security controls to safeguard cloud infrastructures. This module prepares you to navigate the challenges of securing modern cloud environments.
What's included
4 videos1 assignment
In this module, we will delve into the foundational concepts of cryptography, from encryption techniques to cryptanalysis methods. You’ll explore tools and best practices for deploying robust cryptographic defenses and learn how to analyze and secure systems against crypto-attacks. This comprehensive overview equips you with the skills to strengthen data protection measures.
What's included
6 videos1 reading2 assignments
Instructor
![Packt - Course Instructors](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-instructor-photos.s3.amazonaws.com/2b/9c92f373414941b4a0bbda577bd627/profile.jpg?auto=format%2Ccompress&dpr=1&w=75&h=75&fit=crop)
Offered by
Recommended if you're interested in Security
Why people choose Coursera for their career
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Felipe_Moitta.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Jennifer_John.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Larry_Tao_Wang_1.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Chaitanya_Anand.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/dbbd1f929548aa2b3b38c0e6b2887a0f.png?auto=format%2Ccompress&dpr=1&w=1344&h=548&q=30)
![Placeholder](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/7a1c0e2e779c1ff27cae62480adfe003.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=120)
![Coursera Plus](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/7a1c0e2e779c1ff27cae62480adfe003.png?auto=format%2Ccompress&dpr=1&w=120&h=15&q=40)
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/5f44d3cc170f76b9fadb15e8592d4411.png?auto=format%2Ccompress&dpr=1&w=1344&h=548&q=30)
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/653449eb209c5cc24d2935ed5a0f18cd.png?auto=format%2Ccompress&dpr=1&w=1344&h=548&q=30)
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.