This course explains the science and art behind offensive security techniques used in penetration testing of networks and systems. A review of networking concepts is given. Students will utilize low-level programming through network interfaces, in executing a variety of network attacks, while learning to use essential auxiliary tooling for both recon and active attacks. An introduction to cryptogpahy for pentesters is provided.

Security & Ethical Hacking: Attacking the Network

Security & Ethical Hacking: Attacking the Network
This course is part of Security and Ethical Hacking Specialization

Instructor: Ahmed M. Hamza
Access provided by Syrian Youth Assembly
2,320 already enrolled
11 reviews
Recommended experience
What you'll learn
Advanced evasive Techniques on hardened computer systems and networks.
Network recon and man-in-the-middle attacks to compromise credentials
Network attacks on HTTPS and firewalled systems
Skills you'll gain
Tools you'll learn
Details to know

Add to your LinkedIn profile
6 assignments
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 5 modules in this course
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Build toward a degree
This course is part of the following degree program(s) offered by University of Colorado Boulder. If you are admitted and enroll, your completed coursework may count toward your degree learning and your progress can transfer with you.¹
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Explore more from Computer Science

University of Colorado Boulder

University of London



