Vulnerability Scanning Network Attacks
Skills:
Network Security90%
This course moves from reconnaissance into active exploitation, covering approximately 4 hours and 50 minutes of expert instruction across four focused modules. In Vulnerability Scanning Fundamentals, learners are introduced to the scanning process with live demos and hands-on Nmap labs. Advanced Scanning and Credential Attacks then deepens that foundation — covering target considerations, scan analysis, Nmap scoping and timing, vulnerability prioritization using CVSS and EPSS scoring, and credential attack techniques including password cracking labs. Network-Based Attacks shifts into exploitation, covering man-in-the-middle techniques, ARP spoofing, DNS attacks, and service exploitation. The course closes with Wireless and RF Attacks, exploring WPA2 handshake cracking, evil twin access points, Bluetooth vulnerabilities, and other RF-based attack techniques.
Learners benefit by gaining practical skills in vulnerability analysis, network protocol exploitation, man-in-the-middle attacks, packet manipulation, and wireless network cracking — techniques directly applicable to real-world red team engagements and defensive security roles. The course integrates Labtainers hands-on labs with Nmap, Wireshark, and Metasploit, bridging the gap between theory and practice. By the end of this course, learners will be able to conduct a full vulnerability scanning cycle and exploit common network and wireless vulnerabilities in a controlled, authorized environment.
Watch on Coursera ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
More on: Network Security
View skill →Related AI Lessons
⚡
⚡
⚡
⚡
Inside Consumer DVRs — Hardware, Firmware & Network Security Evaluation
Medium · Cybersecurity
Cómo construimos un SOC con honeypot e IA local
Dev.to · Yoandy Ramirez Delgado
Credentials in web applications: how to store them properly
Dev.to · Ian Johnson
XSS Nedir ve Neden Hâlâ Tehlikeli? | Bir Siber Güvenlik Öğrencisinin Notları
Medium · Cybersecurity
🎓
Tutor Explanation
DeepCamp AI