Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Ethical Hacking: Meterpreter, DNS & ICMP Attacks

EDUCBA via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
By the end of this course, learners will be able to identify, execute, and defend against backdoor exploits, privilege escalation, spoofing, redirection, and denial-of-service attacks. They will analyze techniques using Meterpreter, command prompt, DNS spoofing, DHCP manipulation, ICMP redirection, and advanced DDoS strategies. This course equips learners with practical skills to understand real-world cyber threats while mastering tools such as John the Ripper, EvilGrade, and Driftnet. Participants will gain hands-on experience in bypassing forensic defenses, creating persistent backdoors, and hijacking network traffic through spoofing and MITM attacks. Unlike generic cybersecurity training, this program integrates both offensive and defensive strategies, enabling learners to not only simulate exploits but also design effective prevention methods. With structured lessons progressing from foundational attacks to advanced disruption techniques, the course ensures a comprehensive learning journey for students, IT professionals, and security enthusiasts. Unique in its scope, this course combines step-by-step demonstrations, network manipulation tactics, and DDoS defense mechanisms, making it ideal for learners seeking actionable penetration testing skills and advanced ethical hacking expertise.

Syllabus

  • Backdoors, Privilege Escalation & Exploits
    • This module explores the foundations of backdoor creation, privilege escalation, and exploitation techniques using Meterpreter, command prompt, and Trojan-based attacks. Learners will understand how attackers gain persistent access, bypass security restrictions, and deploy social engineering methods like malicious PDFs and Java applets.
  • Spoofing, Redirection & Network Manipulation
    • This module introduces students to advanced spoofing and redirection attacks, including ARP, DNS, DHCP, and ICMP manipulation. Learners will study how adversaries exploit trust in network protocols to reroute traffic, perform man-in-the-middle (MITM) attacks, and hijack communications to gain control.
  • DoS, DDoS & Malicious Network Tools
    • This module covers denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks, as well as supporting malicious tools. Students will learn how attackers disrupt services, exploit insecure update mechanisms with tools like EvilGrade, and practice defensive strategies to prevent DDoS on modern systems.

Taught by

EDUCBA

Reviews

4.7 rating at Coursera based on 15 ratings

Start your review of Ethical Hacking: Meterpreter, DNS & ICMP Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.