Security & Ethical Hacking: Attacking Unix and Windows

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Security & Ethical Hacking: Attacking Unix and Windows

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
This course explores the science and art of offensive security techniques used in penetration testing of networks and systems. Areas of focus include post-exploitation and exploitation of Unix (esp. Linux) machines/servers, and Windows OS. A basic review of relevant x86 Assembly language constructs will be given. Students will utilize scripting and low-level programming and other technical means to execute a variety of attacks in adversarial recon, lateral movement, privilege escalation, and authentication bypass on Unix systems, as well as active exploitation of remote memory corruption attacks on multiple OS. An introduction to general computer memory is given, along with other topics in operating systems, as needed. An understanding of C/C++ compiled program languages, code debugging, python programming, and basic computer architecture is required. Experience with Assembly Language programming (Intel) and UNIX command-line (scripting) is preferred. The course is geared towards students in Computer Science, Computer Engineering, and similar domains – but those with sufficient hours of experience in the topics mentioned will be able to follow the material. This course can be taken for academic credit as part of CU Boulder’s Masters of Science in Computer Science (MS-CS) degrees offered on the Coursera platform. This fully accredited graduate degree offer targeted courses, short 8-week sessions, and pay-as-you-go tuition. Admission is based on performance in three preliminary courses, not academic history. CU degrees on Coursera are ideal for recent graduates or working professionals. Learn more: MS in Computer Science: https://coursera.org/degrees/ms-computer-science-boulder
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Stop Blindly Disabling CSRF — Dynamic CSRF Configuration in Spring Security 6
Learn to dynamically configure CSRF protection in Spring Security 6 for hybrid enterprise APIs, replacing global disable strategies
Medium · Cybersecurity
The OpenAI Breach Wasn't About OpenAI – It Was About the 84 Packages Above Them
The OpenAI breach highlights the importance of securing dependencies in the software supply chain, affecting 84 packages above them
Dev.to · Dimitris Kyrkos
Years of Apple's Best Security Work, Cracked in Five Days — Here's What Developers Should Know
Apple's best security measures were cracked in five days, highlighting the importance of ongoing security efforts for developers
Dev.to · ArshTechPro
TorCT PHP RAT 2026
Learn about TorCT PHP RAT, a stealthy Remote Access Trojan written in PHP that operates without port forwarding, and understand its implications for cybersecurity.
Dev.to AI
Up next
Cryptography
Coursera
Watch →