This program equips aspiring penetration testers, security analysts, vulnerability management professionals, and IT security practitioners with the structured methodologies and practical skills required to identify, validate, and remediate security weaknesses in enterprise environments. You will begin by exploring the principles of ethical hacking, understanding the phases of penetration testing, and applying reconnaissance techniques to map attack surfaces responsibly. Through controlled demonstrations and structured analysis, you will learn how to identify exposed services, interpret vulnerability findings, and differentiate true risk from scanner noise.

Penetration Testing and Vulnerability Scanning
本课程是 Cybersecurity Analyst 专项课程 的一部分

位教师:Edureka
访问权限由 Coursera Learning Team 提供
您将学到什么
Analyze attack surfaces through reconnaissance, host discovery, and network scanning techniques.
Evaluate identified vulnerabilities using risk scoring models and contextual business impact.
Apply network and web scanning tools such as Nmap and Nikto to assess exposure.
Design structured vulnerability management and remediation workflows for enterprise systems.
您将获得的技能
- Cyber Governance
- Cyber Engineering
- Risk Management Framework
- Application Security
- Vulnerability Scanning
- Cyber Security Assessment
- Cyber Threat Intelligence
- Open Web Application Security Project (OWASP)
- Linux Commands
- Vulnerability Management
- Patch Management
- Ethical Standards And Conduct
- Exploitation techniques
- Vulnerability Assessments
- Linux
- Linux Administration
- Cyber Security Policies
- Linux Servers
- Penetration Testing
- Web Applications
- 技能部分已折叠。显示 7 项技能,共 20 项。
要了解的详细信息
了解顶级公司的员工如何掌握热门技能

积累特定领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 获得可共享的职业证书

该课程共有4个模块
Build a strong foundation in ethical hacking and vulnerability assessment by understanding how attackers discover and exploit system weaknesses. Learn to apply structured penetration testing methodologies, perform reconnaissance and scanning to map attack surfaces, and evaluate vulnerabilities using industry scoring models and contextual risk factors. Through hands-on practice, you will analyze assessment results, distinguish real risks from scanner noise, and conduct responsible, standards-aligned security testing.
涵盖的内容
16个视频8篇阅读材料4个作业
Advance your ethical hacking skills by performing controlled network and web exploitation simulations to validate real security risks. Learn to analyze service enumeration results, identify protocol weaknesses, and map attack paths across network infrastructures. Apply OWASP-aligned testing techniques to assess web application defenses, validate vulnerabilities through hands-on exploitation, and distinguish exploitable findings from false positives.
涵盖的内容
10个视频4篇阅读材料3个作业
Implement from vulnerability discovery to structured risk reduction by designing and operating effective vulnerability management programs. Learn how to automate patching and remediation workflows, validate fixes through logging and controls, and govern vulnerabilities using policies, metrics, and SLAs. Build dashboards and reports that clearly communicate risk posture, remediation progress, and security improvements to stakeholders.
涵盖的内容
10个视频4篇阅读材料3个作业
This module is designed to assess an individual on the various concepts and teachings covered in this course. Evaluate your knowledge with a comprehensive graded quiz.
涵盖的内容
1个视频1篇阅读材料2个作业1个讨论话题
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
从 Computer Science 浏览更多内容
¹ 本课程的部分作业采用 AI 评分。对于这些作业,将根据 Coursera 隐私声明使用您的数据。






