Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

PenTest Post-Exploitation, Reporting & Tools

via Coursera

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This capstone course completes the CompTIA PenTest+ Specialization with approximately 4 hours and 45 minutes of expert instruction across post-exploitation techniques, post-engagement reporting, tools and code analysis, and an extensive tools inventory. Learners master what happens after initial system compromise and how to bring an engagement to a professional close. Learners benefit by gaining practical skills in maintaining access, lateral movement, covering tracks, and cleaning up after a test — critical competencies for any ethical hacker. The course also develops professional communication skills through structured report writing, including findings, risk ratings, and remediation guidance. An extensive tour of the penetration testing toolkit — Metasploit, Wireshark, Kali Linux, Burp Suite, password crackers, and scripting in Bash, PowerShell, and Python — equips learners with a practical arsenal. By the end of this course, learners will be able to complete a full penetration test lifecycle from initial access through professional reporting.

Syllabus

  • Post-Exploitation
    • This chapter focuses on post‑exploitation by showing how pentesters maintain persistence, move laterally, test network segmentation, and stealthily exfiltrate data while avoiding detection across compromised environments.
  • Post-Engagement Activities
    • This chapter focuses on pen test reporting and communication by teaching how to document findings, identify root causes, deliver clear remediation recommendations for multiple audiences, manage conflicts, and securely close out an engagement.
  • Tools and Code Analysis
    • This chapter covers scripting and automation basics for penetration testing, using common languages and simulation frameworks to streamline repeatable security testing.
  • Tools Inventory
    • This chapter surveys the modern penetration tester’s toolbox, covering reconnaissance, scanning, exploitation, wireless, mobile, cloud, and post‑exploitation tools to assess, compromise, and pivot across diverse environments.
  • Course Assessment
    • Final graded assessment

Taught by

Michael Solomon

Reviews

Start your review of PenTest Post-Exploitation, Reporting & Tools

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.