This course explains the science and art behind offensive security techniques used in penetration testing of networks and systems. A review of networking concepts is given. Students will utilize low-level programming through network interfaces, in executing a variety of network attacks, while learning to use essential auxiliary tooling for both recon and active attacks. An introduction to cryptogpahy for pentesters is provided.
Security & Ethical Hacking: Attacking the Network
Instructor: Ahmed M. Hamza
Sponsored by Coursera Learning Team
Recommended experience
What you'll learn
Conduct Man-in-the-Middle attacks on computer networks, modern browser defenses and protocols.
Describe Penetration testing principles and offensive security advanced practical concepts.
Utilize Offensive techniques and recon methods for hardened systems and networks, firewalking, network manipulation/tunneling for remote attackers.
Details to know
Add to your LinkedIn profile
5 assignments
December 2024
See how employees at top companies are mastering in-demand skills
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 5 modules in this course
Module 1 provides an introduction to the course sequence, motivations, ethical concepts and challenges, and a refresher on networking concepts.
What's included
4 videos4 readings1 assignment1 discussion prompt1 ungraded lab
Module 2 provides an in-depth technical introduction to network packet crafting and interpretation with scapy. Other essential tools such as ncat (and the older netcat!), as well as an introduction to monitoring tools.
What's included
4 videos2 readings1 assignment1 ungraded lab
Module 3 provides a detailed exposition of Nmap for host discovery, port scanning, service and operating system identification. We touch on firewalking (firewall bypass) and evasion techniques in heavily monitored environments. We also discuss other, related tooling, and manual construction with scapy for some things beyond nmap native capability.
What's included
5 videos1 reading1 assignment1 ungraded lab
Module 4 examines how network recon leads to a variety of network attacks, and the timeline of modern browser-built defenses in encrypted communication, and how these can be bypassed. An advanced attack scenario with malicious software updates is presented.
What's included
5 videos1 assignment1 ungraded lab
Most advanced attackers possess evasive capabilities when operating campaigns in any target network -- module 5 builds on previous material and focuses specifically on masking attacker activities with network tunneling. We examine the SSH protocol and tunneling forms, as well as how to use dynamic socks proxies to enable any remote tool to covertly tunnel into, and operate within, a target space.
What's included
6 videos1 reading1 assignment1 ungraded lab
Instructor
Offered by
Why people choose Coursera for their career
Recommended if you're interested in Computer Science
LearnKartS
University of Colorado Boulder
EC-Council
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy