Penetration Testing

Sort options

Vulnerabilidades y pruebas de penetración (Coursera)

El curso Vulnerabilidades y pruebas de penetración busca que identifiques los conceptos de detección de vulnerabilidades y amenazas, los fundamentos de los ciberataques y de pruebas de penetración a sistemas. Este curso se desarrolla en cuatro (4) módulos en donde aprenderás a cómo Identificar las vulnerabilidades y amenazas de [...]

Hacking and Patching (Coursera)

In this MOOC, you will learn how to hack web apps with command injection vulnerabilities in a web site of your AWS Linux instance. You will learn how to search valuable information on a typical Linux systems with LAMP services, and deposit and hide Trojans for future [...]

Proactive Computer Security (Coursera)

I’ve heard this before – “I’m not sure my computer security practices are working”. I reply “Have you tested them?” This course is the fourth and final course in the Practical Computer Security specialization. In this course, you’ll learn how to proactively test what you [...]

Penetration Testing, Incident Response and Forensics (Coursera)

This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will learn about the different phases of penetration testing, how to gather data for your penetration test and popular penetration testing tools. Furthermore, you will learn [...]

Software Security (Cousera)

This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis [...]

Cybersecurity Basics (edX)

Self Paced
Cybersecurity Basics (edX)
Course Auditing
Categories
Effort
Languages
This course gives you the background needed to understand the basics of Cybersecurity. You will explore information security from its history to a description of various cybercriminals and cybersecurity threats concluding with the tools needed to prevent an attack.

Network Security (Udacity)

This course provides an introduction to computer and network security. Students successfully completing this class will be able to evaluate works in academic and commercial security, and will have rudimentary skills in security research. The course begins with a tutorial of the basic elements of cryptography, cryptanalysis, and systems [...]

Ethical Hacking: An Introduction (FutureLearn)

Jan 16th 2023
Ethical Hacking: An Introduction (FutureLearn)
Course Auditing
Categories
Effort
Languages
Learn the principles and methods of ethical hacking and penetration testing, and build your ethical hacking skills. Explore the principles and methods of ethical hacking. What is ethical hacking? How does it work? What principles do ethical hackers follow? Answer these questions and more with the course introducing ethical [...]

Penetration Testing - Post Exploitation (edX)

Learn post-exploitation phases of penetration testing, including Owning, Pivoting, Privilege Escalation and other advanced penetration testing topics. The machine's value is determined by the sensitivity of the data stored on it and the machine's usefulness in further compromising the network.

Penetration Testing - Exploitation (edX)

Learn exploitation phase of penetration testing, including the foundations of explorations, application debugging, reverse engineering, exploitation development and web application exploitation. This is a self-paced course that continues the development of ethical hacking skills. The curriculum provides an introduction to the exploitation phase of penetration testing topics. Among the [...]