Security & Ethical Hacking: Attacking the Network

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Security & Ethical Hacking: Attacking the Network

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
This course explains the science and art behind offensive security techniques used in penetration testing of networks and systems. A review of networking concepts is given. Students will utilize low-level programming through network interfaces, in executing a variety of network attacks, while learning to use essential auxiliary tooling for both recon and active attacks. An introduction to cryptogpahy for pentesters is provided. An understanding of python programming, C programming, and basic computer architecture is recommended. Programming experience is required. Familiarity with x86 Assembly (or some assembly language) is recommended. This course can be taken for academic credit as part of CU Boulder’s Masters of Science in Computer Science (MS-CS) degrees offered on the Coursera platform. This fully accredited graduate degree offer targeted courses, short 8-week sessions, and pay-as-you-go tuition. Admission is based on performance in three preliminary courses, not academic history. CU degrees on Coursera are ideal for recent graduates or working professionals. Learn more: MS in Computer Science: https://coursera.org/degrees/ms-computer-science-boulder
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

How to secure your macOS games
Secure your macOS games with these steps to protect your device from potential threats
Dev.to · GuardingPearSoftware
The Hidden Risk in Emergency Evacuation Plans Nobody Talks About
Organizations struggle to identify who is inside their buildings during emergencies, posing a hidden risk in evacuation plans
Medium · Cybersecurity
3 Key Takeaways on Why Cybersecurity Product Management Matters More Than Ever
Cybersecurity product management is crucial for building trust in digital products, learn how to prioritize security in product design
Medium · Cybersecurity
The Coding Challenge That Came for Your development Directory: Anatomy of a Job Interview Infostealer
Learn to identify and protect against malicious coding challenges that can steal sensitive information from your development directory
Dev.to · Alex Chen
Up next
Cryptography
Coursera
Watch →