The course "Advanced Cybersecurity Techniques" delves into advanced cybersecurity methodologies, equipping learners with practical skills to tackle complex security challenges. Covering critical topics such as mobile device vulnerabilities, DNS attacks, network exploitation, web application security, and Wi-Fi exploitation, participants will gain hands-on experience through practical labs and real-world scenarios. Learners will benefit from a comprehensive understanding of the latest attack vectors and mitigation strategies, enhancing their ability to safeguard digital environments. The course emphasizes ethical hacking methodologies, utilizing the MITRE ATT&CK Enterprise Framework to provide a structured approach to understanding cyber exploits.

Advanced Cybersecurity Techniques
本课程是 Introduction to Ethical Hacking 专项课程 的一部分

位教师:Jason Crossland
访问权限由 Coursera Learning Team 提供
您将学到什么
Learn to identify and exploit vulnerabilities in mobile devices, networks, and web applications.
Master the use of ethical hacking frameworks to systematically assess and mitigate security threats.
Develop effective countermeasures to mitigate DNS, Wi-Fi, and protocol-based cyberattacks.
您将获得的技能
- Network Protocols
- Network Security
- Web Applications
- Distributed Denial-Of-Service (DDoS) Attacks
- Cybersecurity
- MITRE ATT&CK Framework
- Brute-force attacks
- Vulnerability Assessments
- Mobile Security
- Open Web Application Security Project (OWASP)
- Exploitation techniques
- Encryption
- Wireless Networks
- Penetration Testing
- 技能部分已折叠。显示 8 项技能,共 14 项。
要了解的详细信息

添加到您的领英档案
15 项作业
了解顶级公司的员工如何掌握热门技能

积累特定领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 获得可共享的职业证书

该课程共有6个模块
This course delves into advanced ethical hacking techniques and security vulnerabilities in mobile devices, networks, and web applications. Participants will explore critical threats, such as the NSO three-stage attack on iOS, various DNS attacks, and common web exploitation risks. Utilizing the MITRE ATT&CK Enterprise Framework and ethical hacking labs, students will develop practical skills in penetration testing and vulnerability assessment. By the end, they will be equipped to identify and mitigate security risks effectively in diverse environments.
涵盖的内容
4篇阅读材料
Discusses the concepts and methodologies for exploiting mobile device platforms.
涵盖的内容
4个视频6篇阅读材料3个作业
Discusses the goals, objectives, methods/approaches, and tools used in the scanning and reconnaissance phase.
涵盖的内容
6个视频3篇阅读材料3个作业
Discusses the goals, objectives, methods/approaches, and tools used to conduct network exploitation activities. Covers the importance of why network exploitation is done and how to “sniff” certain data objects.
涵盖的内容
9个视频2篇阅读材料3个作业
Discusses the Top Ten Open Web Application Security Project (OWASP) attacks, approaches, methodologies, and tools used in web application security.
涵盖的内容
5个视频3篇阅读材料3个作业
Discusses the most common and current techniques/methods for gaining access to wireless networks, IEEE, and 802.11 protocols for connection, handshake, and authentication. Covers beacons, probes, tactics and tools used for WEP, WPA, WPA2, & WPA3.
涵盖的内容
8个视频4篇阅读材料3个作业
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
位教师

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
从 Information Technology 浏览更多内容

Johns Hopkins University





