Exploit Development, Malware, & Defensive Strategies

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Exploit Development, Malware, & Defensive Strategies

Coursera · Intermediate ·🔐 Cybersecurity ·1mo ago
Updated in May 2025. This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. This course provides an advanced exploration of exploit development, malware creation, and defensive strategies in ethical hacking. By delving into object-oriented programming, building backdoors, creating malicious payloads, and analyzing network traffic, learners will gain hands-on experience in crafting cybersecurity tools and deploying them for real-world testing. The course also highlights defensive tactics, equipping learners with the skills necessary to protect systems from the very exploits they learn to develop. The course starts with Object-Oriented Programming (OOP) in Python, where students will learn how to define and use classes and methods, implement inheritance, and handle errors. This foundational knowledge is crucial for creating robust scripts for ethical hacking tasks. Next, we cover the creation and manipulation of backdoors, teaching students how to write listener scripts, send commands remotely, and encode communications for stealth. This leads into malware analysis, with lessons on creating and packaging malicious files, configuring them to run on system startup, and using tools like Regedit to modify system configurations. In addition to offensive techniques, the course also explores key defensive strategies like packet listening and Man-in-the-Middle (MITM) attacks. Students will learn how to capture network traffic using Wireshark, create ARP poisoning attacks, and build tools for network scanning and keylogging. The inclusion of real-world case studies and practical projects provides students with a comprehensive understanding of both the attack and defense sides of cybersecurity, preparing them for certifications and advanced roles in penetration testing and ethical hacking. This course i
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Stop Storing JWTs in localStorage: A Security Guide for Web Developers
Learn why storing JWTs in localStorage is insecure and how to secure your web application's authentication, which is crucial for protecting user data
Dev.to · Damilola Owolabi
Inside Consumer DVRs — Hardware, Firmware & Network Security Evaluation
Learn about the hardware, firmware, and network security of consumer DVRs through a reverse engineering analysis of the Hikvision DS-7204HUHI-K
Medium · Cybersecurity
Cómo construimos un SOC con honeypot e IA local
Learn how to build a Security Operations Center (SOC) using honeypot and local AI to detect and prevent cyber threats
Dev.to · Yoandy Ramirez Delgado
Credentials in web applications: how to store them properly
Learn how to store credentials properly in web applications to prevent breaches
Dev.to · Ian Johnson
Up next
A single PR just hijacked the NPM registry...
Fireship
Watch →