Total Seminars

CompTIA PenTest+ Specialization 专项课程

Total Seminars

CompTIA PenTest+ Specialization 专项课程

Michael Solomon

位教师:Michael Solomon

包含在 Coursera Plus

深入学习学科知识
高级设置 等级

推荐体验

4 周 完成
在 5 小时 一周
灵活的计划
自行安排学习进度
深入学习学科知识
高级设置 等级

推荐体验

4 周 完成
在 5 小时 一周
灵活的计划
自行安排学习进度

您将学到什么

  • How to plan, scope, and systematically execute penetration tests using industry-standard methodologies including MITRE ATT&CK, OWASP, and PTES

  • How to identify, exploit, and document vulnerabilities across networks, web applications, and specialized systems including IoT and mobile devices

  • How to conduct post-exploitation activities, maintain access,and produce penetration test reports with actionable remediation recommendations

要了解的详细信息

可分享的证书

添加到您的领英档案

授课语言:英语(English)
最近已更新!

May 2026

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

精进特定领域的专业知识

  • 向大学和行业专家学习热门技能
  • 借助实践项目精通一门科目或一个工具
  • 培养对关键概念的深入理解
  • 通过 Total Seminars 获得职业证书

专业化 - 4门课程系列

PenTest Planning & Information Gathering

PenTest Planning & Information Gathering

第 1 门课程, 小时

您将学到什么

  • How to plan, scope, and document a penetration testing engagement including rules of engagement, NDAs, SOWs, and regulatory compliance requirements

  • How to perform passive and active reconnaissance using OSINT tools and techniques to build a comprehensive intelligence picture of a target

  • How to apply industry-standard penetration testing frameworks (MITRE ATT&CK, PTES, CREST) to structure and prioritize a professional engagement

Vulnerability Scanning Network Attacks

Vulnerability Scanning Network Attacks

第 2 门课程, 小时

您将学到什么

  • How to use vulnerability scanning tools (Nmap, Wireshark, Metasploit) to identify security weaknesses using CVSS and EPSS scoring frameworks

  • How to perform network-based attacks including man-in-the-middle, ARP manipulation, and service exploitation against real and simulated targets

  • How to identify and exploit wireless network vulnerabilities including WPA2 handshake attacks and RF-based attack vectors such as Bluetooth exploits

Application, Cloud, and Specialized Attacks

Application, Cloud, and Specialized Attacks

第 3 门课程, 小时

您将学到什么

  • How to identify and exploit web application and database vulnerabilities including SQL injection, XSS, and privilege escalation techniques

  • How to assess cloud infrastructure security and exploit misconfigurations in AWS, Azure, and other cloud platforms during an authorized engagement

  • How to conduct social engineering simulations, and perform assessments on specialized systems including IoT devices and industrial control systems

PenTest Post-Exploitation, Reporting & Tools

PenTest Post-Exploitation, Reporting & Tools

第 4 门课程, 小时

您将学到什么

  • How to maintain access, move through a network, and cover tracks after initial system compromise using professional post-exploitation techniques

  • How to write clear penetration test reports with findings categorized by severity, risk-rated remediation recommendations, and executive summaries

  • How to use and script with the penetration testing toolkit including Metasploit, Wireshark, Burp Suite, Kali Linux, and Bash/Python automation

获得职业证书

将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。

位教师

Michael Solomon
Total Seminars
0 门课程0 名学生

提供方

Total Seminars

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'

Jennifer J.

自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'

Larry W.

自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'

Chaitanya A.

''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'
Coursera Plus

通过 Coursera Plus 开启新生涯

无限制访问 10,000+ 世界一流的课程、实践项目和就业就绪证书课程 - 所有这些都包含在您的订阅中

通过在线学位推动您的职业生涯

获取世界一流大学的学位 - 100% 在线

加入超过 3400 家选择 Coursera for Business 的全球公司

提升员工的技能,使其在数字经济中脱颖而出

常见问题