Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This course moves from reconnaissance into active exploitation, covering approximately 4 hours and 50 minutes of expert instruction across four focused modules. In Vulnerability Scanning Fundamentals, learners are introduced to the scanning process with live demos and hands-on Nmap labs. Advanced Scanning and Credential Attacks then deepens that foundation — covering target considerations, scan analysis, Nmap scoping and timing, vulnerability prioritization using CVSS and EPSS scoring, and credential attack techniques including password cracking labs. Network-Based Attacks shifts into exploitation, covering man-in-the-middle techniques, ARP spoofing, DNS attacks, and service exploitation. The course closes with Wireless and RF Attacks, exploring WPA2 handshake cracking, evil twin access points, Bluetooth vulnerabilities, and other RF-based attack techniques.
Learners benefit by gaining practical skills in vulnerability analysis, network protocol exploitation, man-in-the-middle attacks, packet manipulation, and wireless network cracking — techniques directly applicable to real-world red team engagements and defensive security roles. The course integrates Labtainers hands-on labs with Nmap, Wireshark, and Metasploit, bridging the gap between theory and practice. By the end of this course, learners will be able to conduct a full vulnerability scanning cycle and exploit common network and wireless vulnerabilities in a controlled, authorized environment.