Get ready to level up your ethical hacking skills with Hands-on Hacking, a highly practical course designed to sharpen your penetration testing capabilities across real-world scenarios. From reconnaissance and vulnerability discovery to privilege escalation and exploit development, this course offers an immersive journey through the full spectrum of offensive cybersecurity tactics. By the end, you’ll confidently navigate through complex systems, uncover security gaps, and simulate advanced attack techniques.



Expérience recommandée
Ce que vous apprendrez
Perform advanced enumeration and scanning to identify vulnerable services and systems.
Exploit web apps, decrypt HTTPS traffic, and simulate real-world access and escalation attacks.
Develop and execute custom exploits using fuzzing, buffer overflow, and shellcode injection.
Practice pivoting and escalation techniques across complex multi-machine environments.
Compétences que vous acquerrez
- Catégorie : Bash (Scripting Language)
- Catégorie : Unix Commands
- Catégorie : Vulnerability Assessments
- Catégorie : Penetration Testing
- Catégorie : Program Development
- Catégorie : Windows Servers
- Catégorie : Network Security
- Catégorie : Command-Line Interface
- Catégorie : Unix Shell
- Catégorie : Cyber Security Assessment
- Catégorie : Scripting
- Catégorie : Active Directory
- Catégorie : Proxy Servers
- Catégorie : Apache Tomcat
- Catégorie : Web Applications
- Catégorie : Shell Script
- Catégorie : Microsoft Windows
Détails à connaître

Ajouter à votre profil LinkedIn
mai 2025
9 devoirs
Découvrez comment les employés des entreprises prestigieuses maîtrisent des compétences recherchées


Obtenez un certificat professionnel
Ajoutez cette qualification à votre profil LinkedIn ou à votre CV
Partagez-le sur les réseaux sociaux et dans votre évaluation de performance

Il y a 8 modules dans ce cours
In this module, we will explore a full attack lifecycle against a target system, starting with reconnaissance and ending with full administrative access. You’ll use tools like Burp Suite and Wireshark to analyze encrypted traffic, uncover hidden vulnerabilities, and exploit misconfigured services. The journey includes both horizontal and vertical privilege escalation to achieve total system compromise.
Inclus
8 vidéos1 lecture1 devoir
In this module, we will take on the GoldenEye vulnerable VM to strengthen your offensive security skills. You'll work through advanced enumeration techniques across web and email services to uncover credentials and vulnerable software. From initial access to full root shell, this module builds your skillset for real-world penetration testing scenarios.
Inclus
6 vidéos1 devoir
In this module, we will target the vulnerable Bob VM to walk through the process of system compromise. You’ll analyze web application behavior, test for injection flaws, and exploit vulnerabilities to gain shell access. Then, through creative privilege escalation, you’ll achieve root access—using both standard and alternate methods for maximum learning.
Inclus
5 vidéos1 devoir
In this module, we will transition from exploitation to exploit development. You’ll learn how to build exploits from scratch by fuzzing for vulnerabilities, manipulating buffer offsets, and avoiding bad characters. The journey concludes with the development of a custom shellcode to gain remote access, reinforcing your understanding of memory manipulation and code execution.
Inclus
6 vidéos1 devoir
In this module, we will navigate the misdirection-filled terrain of a specially crafted VM. You’ll enhance your reconnaissance and enumeration skills while exploring multiple web apps and navigating false leads. After gaining access, you'll apply privilege escalation methods and look for alternate paths to root access, mimicking a thorough real-world assessment.
Inclus
4 vidéos1 devoir
In this module, we will take on a dual-VM challenge involving Straylight and Neuromancer. You’ll perform advanced enumeration, exploit LFI and email servers, and then pivot through port forwarding to access and compromise a second system. You'll wrap up with privilege escalation techniques, learning to chain attacks across multiple targets.
Inclus
8 vidéos1 devoir
In this module, we will focus on Windows environments—particularly Active Directory systems. You’ll scan networks, exploit weak configurations, and access services such as MS-SQL using compromised credentials. This section strengthens your understanding of Windows privilege escalation and post-exploitation tactics.
Inclus
4 vidéos1 devoir
In this module, we will tackle the FunBox2 VM to showcase real-world exploitation techniques. You’ll use enumeration skills to uncover a weak password, escape from a jailed shell, and then escalate privileges by uncovering sensitive information. The module offers a practical look into the nuances of post-exploitation.
Inclus
4 vidéos2 devoirs
Instructeur

Offert par
Pour quelles raisons les étudiants sur Coursera nous choisissent-ils pour leur carrière ?





Ouvrez de nouvelles portes avec Coursera Plus
Accès illimité à 10,000+ cours de niveau international, projets pratiques et programmes de certification prêts à l'emploi - tous inclus dans votre abonnement.
Faites progresser votre carrière avec un diplôme en ligne
Obtenez un diplôme auprès d’universités de renommée mondiale - 100 % en ligne
Rejoignez plus de 3 400 entreprises mondiales qui ont choisi Coursera pour les affaires
Améliorez les compétences de vos employés pour exceller dans l’économie numérique
Foire Aux Questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
Plus de questions
Aide financière disponible,