- Intrusion Detection and Prevention
- Cloud Security
- Exploitation techniques
- Network Security
- Vulnerability Assessments
- Application Security
- Wireless Networks
- Cyber Security Assessment
- Virtual Local Area Network (VLAN)
- Penetration Testing
- Application Programming Interface (API)
- Distributed Denial-Of-Service (DDoS) Attacks
Advanced Penetration Techniques
Completed by Muhammad Izaz Haider
August 8, 2025
12 hours (approximately)
Muhammad Izaz Haider's account is verified. Coursera certifies their successful completion of Advanced Penetration Techniques
What you will learn
Exploit vulnerabilities across web, mobile, IoT, and cloud environments.
Master post-exploitation techniques, including privilege escalation and persistence.
Conduct sophisticated attacks like VLAN hopping, SSRF, and session hijacking.
Evade advanced defenses with stealthy detection avoidance strategies.
Skills you will gain

