Practical Pentesting

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Practical Pentesting

Coursera · Intermediate ·🔐 Cybersecurity ·1mo ago
Updated in May 2025. This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. This hands-on course guides you through the real-world practice of penetration testing, providing an end-to-end look at what it takes to become a skilled ethical hacker. You'll learn the full lifecycle of a pentest—from the initial client engagement and legal preparations to exploitation, documentation, and final reporting. Whether you're an aspiring pentester or a blue teamer looking to understand offense better, this course has you covered. The journey begins with a foundational understanding of what makes a good pentester, including essential pre-engagement processes like authorization, NDAs, and statements of work. You'll explore how to properly set scope, gather requirements, and ensure ethical and legal compliance before an assessment even begins. From there, the course shifts into the technical nitty-gritty. You'll dive into various stages of assessment—recon, vulnerability scanning, exploitation, maintaining access, and covering tracks—using tools like Nmap, Nessus, BurpSuite, and Dradis. You'll also explore different pentesting platforms like Kali, Parrot, and Black Arch, ensuring you're equipped with the right tools and knowledge for the job. This course is perfect for cybersecurity beginners, junior red teamers, and even blue team professionals seeking to understand offensive tactics. No advanced prerequisites are needed, but familiarity with basic IT concepts will be helpful. The difficulty level is beginner to intermediate, with a strong focus on real-world application.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Stop trusting your agent skills with vibes. Eliminate the context security risk.
Learn to eliminate context security risks by using specific tools to audit package installations, rather than relying on intuition
Dev.to · Tessl
Investigating a Command Injection Attack — SOC168: Whoami Command Detected in Request Body |…
Learn to investigate Command Injection attacks using a real-world example on the LetsDefend SOC platform
Medium · Cybersecurity
pwning Facts
Learn to analyze nmap scan results to identify open ports and potential vulnerabilities in a system
Medium · Cybersecurity
Detecting Dangerous Shell Commands in Rust — Building a Safety Layer
Learn to detect dangerous shell commands in Rust and build a safety layer to prevent malicious activity
Dev.to · hiyoyo
Up next
Cryptography
Coursera
Watch →