This course explains the science and art behind offensive security techniques used in penetration testing of networks and systems. A review of networking concepts is given. Students will utilize low-level programming through network interfaces, in executing a variety of network attacks, while learning to use essential auxiliary tooling for both recon and active attacks. An introduction to cryptogpahy for pentesters is provided.

Security & Ethical Hacking: Attacking the Network
本课程是 Security and Ethical Hacking 专项课程 的一部分

位教师:Ahmed M. Hamza
访问权限由 Coursera Learning Team 提供
2,316 人已注册
您将学到什么
Advanced evasive Techniques on hardened computer systems and networks.
Network recon and man-in-the-middle attacks to compromise credentials
Network attacks on HTTPS and firewalled systems
您将获得的技能
要了解的详细信息

添加到您的领英档案
6 项作业
了解顶级公司的员工如何掌握热门技能

积累特定领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 获得可共享的职业证书

该课程共有5个模块
Module 1 provides an introduction to the course sequence, motivations, ethical concepts and challenges, and a refresher on networking concepts.
涵盖的内容
4个视频6篇阅读材料2个作业1个讨论话题1个非评分实验室
Module 2 provides an in-depth technical introduction to network packet crafting and interpretation with scapy. Other essential tools such as ncat (and the older netcat!), as well as an introduction to monitoring tools.
涵盖的内容
4个视频2篇阅读材料1个作业1个非评分实验室
Module 3 provides a detailed exposition of Nmap for host discovery, port scanning, service and operating system identification. We touch on firewalking (firewall bypass) and evasion techniques in heavily monitored environments. We also discuss other, related tooling, and manual construction with scapy for some things beyond nmap native capability.
涵盖的内容
5个视频1篇阅读材料1个作业1个非评分实验室
Module 4 examines how network recon leads to a variety of network attacks, and the timeline of modern browser-built defenses in encrypted communication, and how these can be bypassed. An advanced attack scenario with malicious software updates is presented.
涵盖的内容
5个视频1个作业1个非评分实验室
Most advanced attackers possess evasive capabilities when operating campaigns in any target network -- module 5 builds on previous material and focuses specifically on masking attacker activities with network tunneling. We examine the SSH protocol and tunneling forms, as well as how to use dynamic socks proxies to enable any remote tool to covertly tunnel into, and operate within, a target space.
涵盖的内容
6个视频1篇阅读材料1个作业1个非评分实验室
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
攻读学位
课程 是 University of Colorado Boulder提供的以下学位课程的一部分。如果您被录取并注册,您已完成的课程可计入您的学位学习,您的学习进度也可随之转移。
位教师

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
从 Computer Science 浏览更多内容

University of Colorado Boulder

University of London




