Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Exploit Development, Malware, & Defensive Strategies

Packt via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Updated in May 2025. This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. This course provides an advanced exploration of exploit development, malware creation, and defensive strategies in ethical hacking. By delving into object-oriented programming, building backdoors, creating malicious payloads, and analyzing network traffic, learners will gain hands-on experience in crafting cybersecurity tools and deploying them for real-world testing. The course also highlights defensive tactics, equipping learners with the skills necessary to protect systems from the very exploits they learn to develop. The course starts with Object-Oriented Programming (OOP) in Python, where students will learn how to define and use classes and methods, implement inheritance, and handle errors. This foundational knowledge is crucial for creating robust scripts for ethical hacking tasks. Next, we cover the creation and manipulation of backdoors, teaching students how to write listener scripts, send commands remotely, and encode communications for stealth. This leads into malware analysis, with lessons on creating and packaging malicious files, configuring them to run on system startup, and using tools like Regedit to modify system configurations. In addition to offensive techniques, the course also explores key defensive strategies like packet listening and Man-in-the-Middle (MITM) attacks. Students will learn how to capture network traffic using Wireshark, create ARP poisoning attacks, and build tools for network scanning and keylogging. The inclusion of real-world case studies and practical projects provides students with a comprehensive understanding of both the attack and defense sides of cybersecurity, preparing them for certifications and advanced roles in penetration testing and ethical hacking. This course is designed for intermediate to advanced learners in cybersecurity, penetration testing, and exploit development. Knowledge of Python programming and networking concepts is beneficial but not required. The content is suitable for professionals aiming to specialize in malware analysis, exploit development, or defensive cybersecurity strategies.

Syllabus

  • Object Oriented Programming
    • In this module, we will introduce Object-Oriented Programming (OOP) concepts, including classes, methods, and inheritance in Python. You'll learn how to apply these principles to build efficient and reusable hacking tools while also mastering error handling techniques.
  • Modules
    • In this module, we will explore the world of Python modules, focusing on how to write, use, and manage them to streamline your ethical hacking scripts. You'll also learn the benefits of using external libraries and the key differences between running scripts directly and importing them.
  • MAC Changer
    • In this module, we will cover the essentials of MAC address manipulation, including how to change MAC addresses for anonymity. You’ll gain hands-on experience with Python, using subprocess and regex techniques to automate the process and enhance your security practices.
  • Network Scanner
    • In this module, we will introduce network scanning techniques, focusing on ARP and broadcast requests to identify devices on a network. You'll also enhance your scanning scripts with new features and ensure they are compatible with Python 3 for more effective cybersecurity assessments.
  • Man In The Middle
    • In this module, we will delve into the tactics behind MITM attacks, demonstrating how to intercept network traffic using ARP poisoning. You will learn how to script these attacks effectively, incorporating error handling and user input for more sophisticated MITM scenarios.
  • Packet Listener
    • In this module, we will dive into packet listening and analysis using Wireshark and Python. You’ll also learn techniques for securing your network traffic against potential listeners while mastering the intricacies of network packet analysis.
  • Keylogger
    • In this module, we will cover the creation of a keylogger using Python, focusing on capturing and logging keystrokes. You’ll also learn how to save, send, and optimize keyloggers, with an emphasis on ethical considerations and proper testing.
  • Backdoor
    • In this module, we will explore backdoor creation, from writing the backdoor script to developing a listener for remote access. You’ll learn how to interact with target systems, retrieve data, and upload files, with an emphasis on error handling and Python 3 compatibility.
  • Packaging & Malicious Files
    • In this module, we will explore how to package and disguise malicious files for deployment, focusing on techniques like changing icons and file extensions. You’ll also learn how to create executable payloads and configure them for persistence in compromised systems.
  • Closing & Ethical Hacker's Handbook
    • In this final module, we will close the course with parting thoughts on the importance of ethical hacking practices. You will be guided towards responsible cybersecurity endeavors and provided with key resources to continue your learning journey.

Taught by

Packt - Course Instructors

Reviews

Start your review of Exploit Development, Malware, & Defensive Strategies

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.