- Intrusion Detection and Prevention
- Cloud Security
- Exploitation techniques
- Network Security
- Vulnerability Assessments
- Application Security
- Wireless Networks
- Cyber Security Assessment
- Virtual Local Area Network (VLAN)
- Penetration Testing
- Application Programming Interface (API)
- Distributed Denial-Of-Service (DDoS) Attacks
Advanced Penetration Techniques
Completed by Aftab Ahmed
July 23, 2025
12 hours (approximately)
Aftab Ahmed's account is verified. Coursera certifies their successful completion of Advanced Penetration Techniques
What you will learn
Exploit vulnerabilities across web, mobile, IoT, and cloud environments.
Master post-exploitation techniques, including privilege escalation and persistence.
Conduct sophisticated attacks like VLAN hopping, SSRF, and session hijacking.
Evade advanced defenses with stealthy detection avoidance strategies.
Skills you will gain

