Advanced Exploitation and Scripting Techniques

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Advanced Exploitation and Scripting Techniques

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
Updated in May 2025. This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. Advance your hacking skills with this comprehensive course focusing on sophisticated exploitation and scripting techniques. Begin with mastering Man-in-the-Middle (MITM) attacks, where you’ll explore the ARP protocol, install and troubleshoot MITMf, and perform advanced attacks like HTTP traffic sniffing and DNS spoofing. You'll also learn how to hook browsers with BEEF, clone web pages, and capture screenshots, providing a robust foundation in MITM attack methodologies. Next, the course transitions to Python basics, which is crucial for any hacker looking to automate tasks and develop custom scripts. Through detailed video lessons, you’ll gain proficiency in Python programming, covering essential topics such as variables, loops, functions, and classes. This foundational knowledge sets the stage for more advanced projects, ensuring you can effectively write and understand Python scripts tailored for hacking. The final sections focus on developing complex hacking tools. You’ll learn to create advanced backdoors capable of reverse shell connections, executing commands, and maintaining persistence. You'll also develop a keylogger to capture keystrokes and integrate it with your backdoor for enhanced functionality. The course culminates in creating a brute force attacker, teaching you to start threads, bypass antivirus software, and send malware with spoofed emails. Each module provides practical, hands-on experience, ensuring you can apply these advanced techniques in real-world scenarios. This course is designed for experienced ethical hackers and cybersecurity professionals looking to advance their exploitation and scripting skills. Prior knowledge of basic ethical hacking principles and familiarity with Python i
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Stop trusting your agent skills with vibes. Eliminate the context security risk.
Learn to eliminate context security risks by using specific tools to audit package installations, rather than relying on intuition
Dev.to · Tessl
Investigating a Command Injection Attack — SOC168: Whoami Command Detected in Request Body |…
Learn to investigate Command Injection attacks using a real-world example on the LetsDefend SOC platform
Medium · Cybersecurity
pwning Facts
Learn to analyze nmap scan results to identify open ports and potential vulnerabilities in a system
Medium · Cybersecurity
Detecting Dangerous Shell Commands in Rust — Building a Safety Layer
Learn to detect dangerous shell commands in Rust and build a safety layer to prevent malicious activity
Dev.to · hiyoyo
Up next
Cryptography
Coursera
Watch →