Starweaver
Offensive Cyber Operations
Starweaver

Offensive Cyber Operations

Gleb Marchenko
Starweaver

位教师:Gleb Marchenko

包含在 Coursera Plus

深入了解一个主题并学习基础知识。
中级 等级

推荐体验

8 小时 完成
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
中级 等级

推荐体验

8 小时 完成
灵活的计划
自行安排学习进度

您将学到什么

  • Deconstruct offensive cyber architectures and adversarial mindsets, exploring motivations and frameworks to strengthen system defense.

  • Analyze the cyber-attack lifecycle from reconnaissance through post-exploitation and impact analysis.

  • Implement core offensive technics and tools, including human-centric social engineering aspects.

  • Navigate AI-driven offensive techniques and emerging threats, including automated attack systems and the use of large language models.

要了解的详细信息

可分享的证书

添加到您的领英档案

最近已更新!

September 2025

授课语言:英语(English)

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

该课程共有6个模块

In this course, you’ll learn how to think like an adversary to strengthen your cybersecurity skills and defenses. You’ll explore attacker methodologies, attack surfaces, and exploitation techniques while mastering frameworks like MITRE ATT&CK to categorize and understand offensive tactics. Through expert guidance, modern threat scenarios, and ethical perspectives, you’ll uncover how adversaries use social engineering, AI-driven exploits, and advanced offensive tools to compromise systems. By the end, you’ll be equipped to anticipate threats, apply strategic defense informed by offensive knowledge, and responsibly adapt to the evolving landscape of cyber warfare.

涵盖的内容

1个视频1篇阅读材料1个插件

In this module, you’ll learn the foundations of offensive cyber operations and the attacker mindset that drives modern threats. You’ll explore core cybersecurity concepts, attack surfaces, and the role of ethical hacking in strengthening defenses. You’ll analyze attacker motivations, psychological tactics, and operational goals to understand why adversaries exploit human and technical weaknesses. Finally, you’ll examine the evolving adversary landscape, threat actor types, and offensive frameworks that shape today’s cybersecurity challenges.

涵盖的内容

10个视频1篇阅读材料1个作业1次同伴评审1个讨论话题

In this module, you’ll explore the full cyber attack life cycle from reconnaissance to post-exploitation. You’ll examine how attackers gather intelligence through OSINT and passive reconnaissance, craft payloads during weaponization, and deliver exploits through phishing, injection, and other techniques. You’ll analyze common vulnerabilities and exploitation tactics to understand how adversaries penetrate defenses. Finally, you’ll study persistence, lateral movement, and data exfiltration, applying frameworks like MITRE ATT&CK to classify real-world adversary behaviors and strengthen defensive strategies.

涵盖的内容

10个视频1篇阅读材料1个作业1次同伴评审1个讨论话题

In this module, you’ll examine the core offensive techniques and tools adversaries use to compromise systems and networks. You’ll explore malware fundamentals, from classification and behaviors to the tools security professionals use for analysis. You’ll dive into social engineering, studying phishing, spear phishing, and advanced impersonation methods such as deepfakes that exploit human psychology. Finally, you’ll analyze network and system-level attacks, including password-based intrusions, denial-of-service campaigns, and protocol-level exploits targeting DNS and VoIP. By connecting these offensive techniques to defensive strategies, you’ll build the knowledge to anticipate, detect, and mitigate modern cyber threats.

涵盖的内容

10个视频1篇阅读材料1个作业1次同伴评审1个讨论话题

In this module, you’ll examine the cutting edge of offensive cyber operations and prepare for future threats. You’ll explore how artificial intelligence is transforming offensive tactics, from AI-powered vulnerability detection to automated attack campaigns and agentic AI. You’ll analyze emerging attack surfaces such as adversarial AI, prompt injection, the Dark Web, and supply chain vulnerabilities that expand opportunities for exploitation. Finally, you’ll study the strategic implications of offensive capabilities for organizations and national security, while applying proactive defense approaches, including Security for LLMs and threat hunting methodologies. By mastering these advanced concepts, you’ll gain the foresight and confidence to anticipate and mitigate next-generation cyber threats.

涵盖的内容

10个视频1篇阅读材料1个作业1次同伴评审1个讨论话题

In this concluding module, you’ll synthesize the knowledge gained throughout the course by designing an offensive cyber operation blueprint. Acting in the role of an ethical offensive operator, you’ll apply reconnaissance, attack surface mapping, vulnerability identification, and emerging threat considerations to create a simulated offensive plan against a fictional organization. Through this project, you’ll transform theoretical understanding into practical application, building confidence in analyzing threats and preparing proactive defense strategies.

涵盖的内容

1个视频1次同伴评审

位教师

Gleb Marchenko
4 门课程262 名学生
Starweaver
Starweaver
446 门课程818,636 名学生

提供方

Starweaver

从 Security 浏览更多内容

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.
自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'
Jennifer J.
自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'
Larry W.
自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'
Chaitanya A.
''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'
Coursera Plus

通过 Coursera Plus 开启新生涯

无限制访问 10,000+ 世界一流的课程、实践项目和就业就绪证书课程 - 所有这些都包含在您的订阅中

通过在线学位推动您的职业生涯

获取世界一流大学的学位 - 100% 在线

加入超过 3400 家选择 Coursera for Business 的全球公司

提升员工的技能,使其在数字经济中脱颖而出

常见问题

¹ 本课程的部分作业采用 AI 评分。对于这些作业,将根据 Coursera 隐私声明使用您的数据。