Discover how generative AI is revolutionizing penetration testing. In this hands-on course, you’ll learn how red teams are leveraging AI to streamline every phase of an attack—from information gathering to vulnerability discovery, exploitation, and social engineering. You'll gain practical experience with tools like SpiderFoot, Nmap, Burp Suite, Metasploit, and PentestGPT to automate OSINT, prioritize scan results, exploit weaknesses, and maintain access in real-world scenarios. You'll also use AI to craft phishing emails and fake identities, simulating advanced social engineering tactics. Designed for cybersecurity professionals and aspiring ethical hackers, this course combines cutting-edge AI workflows with proven penetration testing strategies. Learn to think like an attacker—and use AI to move faster, smarter, and more effectively in today’s dynamic threat landscape.


您将学到什么
Use AI-powered tools to automate OSINT and reconnaissance
Discover and prioritize vulnerabilities using AI-enhanced scanning
Execute AI-assisted exploitation and persistence techniques
Design AI-generated phishing campaigns and fake personas
您将获得的技能
要了解的详细信息
了解顶级公司的员工如何掌握热门技能

该课程共有3个模块
This module introduces learners to the foundational phase of penetration testing: reconnaissance. You will learn how to gather information about a target using both traditional open-source intelligence (OSINT) techniques and AI-powered automation. Emphasis is placed on the importance of obtaining clear, written client permission before any testing begins. The module covers Google Dorking, the use of cheat sheets for advanced search techniques, and the deployment of SpiderFoot, a powerful OSINT automation tool commonly found in Kali Linux. You will see how AI can help automate the collection and analysis of publicly available data to identify potential vulnerabilities and targets.
涵盖的内容
13个视频3个作业2个插件
This module moves from information gathering to vulnerability discovery. Learners will use Burp Suite, a leading web application security testing tool, to scan for common vulnerabilities, including those listed in the OWASP Top 10. The module highlights the differences between Burp Suite Community and Professional editions, especially regarding AI-powered features. Learners will practice automated and manual testing using Burp’s Scanner, Intruder, and Repeater tools, and see how AI can prioritize and analyze results.
涵盖的内容
8个视频3个作业
In this module, learners will leverage AI to automate the exploitation of discovered vulnerabilities and maintain post-exploitation access. The focus is on using Metasploit, a widely used penetration testing framework, in combination with PentestGPT, a specialized AI for cybersecurity. Learners will receive step-by-step guidance for exploiting services such as SSH, creating and deploying payloads, and using advanced features like Meterpreter and msfvenom for custom payload generation.
涵盖的内容
9个视频3个作业
提供方
从 Security 浏览更多内容
- 状态:免费试用
Vanderbilt University
- 状态:免费试用
Fractal Analytics
人们为什么选择 Coursera 来帮助自己实现职业发展




常见问题
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,
¹ 本课程的部分作业采用 AI 评分。对于这些作业,将根据 Coursera 隐私声明使用您的数据。