Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Vulnerability Scanning Network Attacks

via Coursera

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This course moves from reconnaissance into active exploitation, covering approximately 4 hours and 50 minutes of expert instruction across four focused modules. In Vulnerability Scanning Fundamentals, learners are introduced to the scanning process with live demos and hands-on Nmap labs. Advanced Scanning and Credential Attacks then deepens that foundation — covering target considerations, scan analysis, Nmap scoping and timing, vulnerability prioritization using CVSS and EPSS scoring, and credential attack techniques including password cracking labs. Network-Based Attacks shifts into exploitation, covering man-in-the-middle techniques, ARP spoofing, DNS attacks, and service exploitation. The course closes with Wireless and RF Attacks, exploring WPA2 handshake cracking, evil twin access points, Bluetooth vulnerabilities, and other RF-based attack techniques. Learners benefit by gaining practical skills in vulnerability analysis, network protocol exploitation, man-in-the-middle attacks, packet manipulation, and wireless network cracking — techniques directly applicable to real-world red team engagements and defensive security roles. The course integrates Labtainers hands-on labs with Nmap, Wireshark, and Metasploit, bridging the gap between theory and practice. By the end of this course, learners will be able to conduct a full vulnerability scanning cycle and exploit common network and wireless vulnerabilities in a controlled, authorized environment.

Syllabus

  • Vulnerability Scanning
    • This chapter covers reconnaissance, scanning, enumeration, and vulnerability analysis by using industry tools, labs, and scoring models to prepare effective penetration testing attacks.
  • Network-Based Attacks
    • This chapter explores network and authentication attacks by leveraging exploit databases, protocol vulnerabilities, man‑in‑the‑middle techniques, and hands‑on labs to plan, chain, and execute sophisticated penetration testing exploits.
  • Wireless and RF Attacks
    • This chapter examines wireless penetration testing by exploring packet capture tools, specialized antennas, and modern attack techniques to identify wireless, Bluetooth, and RFID communications.
  • Course Assessment
    • Final graded assessment

Taught by

Michael Solomon

Reviews

Start your review of Vulnerability Scanning Network Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.