Ethical Hacking: Meterpreter, DNS & ICMP Attacks
By the end of this course, learners will be able to identify, execute, and defend against backdoor exploits, privilege escalation, spoofing, redirection, and denial-of-service attacks. They will analyze techniques using Meterpreter, command prompt, DNS spoofing, DHCP manipulation, ICMP redirection, and advanced DDoS strategies.
This course equips learners with practical skills to understand real-world cyber threats while mastering tools such as John the Ripper, EvilGrade, and Driftnet. Participants will gain hands-on experience in bypassing forensic defenses, creating persistent backdoors, and hijacking network traffic through spoofing and MITM attacks.
Unlike generic cybersecurity training, this program integrates both offensive and defensive strategies, enabling learners to not only simulate exploits but also design effective prevention methods. With structured lessons progressing from foundational attacks to advanced disruption techniques, the course ensures a comprehensive learning journey for students, IT professionals, and security enthusiasts.
Unique in its scope, this course combines step-by-step demonstrations, network manipulation tactics, and DDoS defense mechanisms, making it ideal for learners seeking actionable penetration testing skills and advanced ethical hacking expertise.
Watch on Coursera ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Related AI Lessons
⚡
⚡
⚡
⚡
Inside Consumer DVRs — Hardware, Firmware & Network Security Evaluation
Medium · Cybersecurity
Cómo construimos un SOC con honeypot e IA local
Dev.to · Yoandy Ramirez Delgado
Credentials in web applications: how to store them properly
Dev.to · Ian Johnson
XSS Nedir ve Neden Hâlâ Tehlikeli? | Bir Siber Güvenlik Öğrencisinin Notları
Medium · Cybersecurity
🎓
Tutor Explanation
DeepCamp AI