Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "penetration testing"
- Status: Free Trial
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Open Web Application Security Project (OWASP), Vulnerability Assessments, Exploitation techniques, Test Planning
Coursera Project Network
Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Data Ethics, Virtual Machines, Linux, Technical Documentation
- Status: NewStatus: Free Trial
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Network Protocols
- Status: Free Trial
EC-Council
Skills you'll gain: Penetration Testing, Threat Modeling, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Security Awareness, Cybersecurity, Cloud Computing, Intrusion Detection and Prevention, Cyber Attacks, Application Security, Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks
- Status: Free TrialStatus: AI skills
Skills you'll gain: Operating System Administration, Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Computer Security Incident Management, Linux Commands, Database Management, Network Security, Networking Hardware, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
- Status: NewStatus: Free Trial
Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Management, Vulnerability Assessments, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Network Troubleshooting, Anomaly Detection, Cyber Attacks, Computer Security, Network Analysis
What brings you to Coursera today?
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Information Systems Security, Software Installation, Virtual Machines
- Status: Free TrialStatus: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, System Testing, Cloud Security, Vulnerability Scanning, Threat Management, Cloud Computing, Authentications, Active Directory, Operating Systems, Data Management, Computer Security Incident Management
- Status: Free Trial
Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Cloud Security, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Exploitation techniques, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
- Status: Free Trial
Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Exploit development, Cybersecurity, Network Security, System Monitoring, Cyber Operations, Continuous Monitoring, Cyber Threat Intelligence, Exploitation techniques, Scripting, IT Automation, Network Monitoring, Command-Line Interface, Persistence, Python Programming, Data Access, Computer Programming
- Status: Free Trial
LearnKartS
Skills you'll gain: Penetration Testing, Network Security, Threat Modeling, Cryptography, Threat Management, Virtual Machines
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Bioinformatics, Unix Commands, Biostatistics, Exploratory Data Analysis, Statistical Analysis, Unix, Data Science, Data Management, Statistical Methods, Molecular Biology, Command-Line Interface, Statistical Hypothesis Testing, Linux Commands, Data Analysis Software, Statistical Modeling, Data Structures, R Programming, Computational Thinking, Jupyter, Python Programming
Searches related to penetration testing
In summary, here are 10 of our most popular penetration testing courses
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Metasploit for Beginners: Ethical Penetration Testing:Â Coursera Project Network
- Secure Against Network Intrusions:Â Google
- Ethical Hacking Essentials (EHE):Â EC-Council
- IBM Cybersecurity Analyst:Â IBM
- IBM Ethical Hacking with Open Source Tools:Â IBM
- Exploitation and Penetration Testing with Metasploit:Â IBM
- Microsoft Cybersecurity Analyst:Â Microsoft
- Cybersecurity Tools and Technologies:Â Microsoft
- Python for Cybersecurity:Â Infosec