This course will be useful to anyone who is an experienced cybersecurity practitioner and would like to take their skills to the next level. You will begin a multi-stage process by performing reconnaissance and simulating an attack using Metasploit. You'll then exploit code-execution, injection, and web-app vulnerabilities. Lastly, you'll exploit access, network, data, and file-configuration vulnerabilities. These all contribute to the first stage of the overall CFR-A program: Attack.
只需 199 美元(原价 399 美元)即可通过 Coursera Plus 学习更高水平的技能。立即节省

您将学到什么
In this course, you will get oriented to your tools and environment, exploit vulnerabilities in software, and exploit vulnerabilities in systems.
您将获得的技能
- Scripting Languages
- Cyber Attacks
- Exploit development
- System Configuration
- Vulnerability Scanning
- Metasploit
- Data Security
- Penetration Testing
- Bash (Scripting Language)
- Linux Commands
- Vulnerability Assessments
- Vulnerability
- Distributed Denial-Of-Service (DDoS) Attacks
- Linux
- Network Security
- Python Programming
- Cybersecurity
- Scripting
- Proxy Servers
- Exploitation techniques
要了解的详细信息

添加到您的领英档案
December 2025
1 项作业
了解顶级公司的员工如何掌握热门技能

积累特定领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 获得可共享的职业证书

该课程共有4个模块
Whether you're thinking like an attacker or a defender, it's always good to start by knowing what you're up against. This first lesson will ensure you're suitably acquainted with the systems and software that comprise the overall class environment. You'll also become more familiar with the role(s) each system or software plays throughout the course, as well as your initial role as a threat actor.
涵盖的内容
1篇阅读材料6个插件
In this lesson, you'll conduct a simulated attack campaign by focusing on exploiting flaws in software. You'll execute different types of attacks on different types of software to see how these flaws can lead to significant compromise.
涵盖的内容
4个插件
Your simulated attack campaign will continue and eventually conclude with this lesson, which shifts the focus from exploiting software vulnerabilities to exploiting flaws in systems. These flaws exist regardless of how up to date or regularly patched the organization's software is, so attackers won't hesitate to use them as a vector if the software-based attacks prove ineffective.
涵盖的内容
6个插件
You'll wrap things up and then validate what you've learned in this course by taking an assessment.
涵盖的内容
1篇阅读材料1个作业
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
位教师

提供方
从 Security 浏览更多内容
人们为什么选择 Coursera 来帮助自己实现职业发展




常见问题
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,









