Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
The Certified Ethical Hacker (CEH) v12 course is your comprehensive guide to mastering ethical hacking and cybersecurity. This program equips you to identify vulnerabilities, defend against threats, and secure digital infrastructures. Through hands-on practice, you’ll learn tools, techniques, and methodologies used by ethical hackers to protect systems and networks.
You’ll begin with foundational concepts such as attacker motives, the Cyber Kill Chain, and risk management, progressing to reconnaissance techniques like footprinting, scanning, and enumeration. Explore system hacking phases, password attacks, privilege escalation, and malware analysis to gain a deep understanding of modern cyber threats. Modules on web applications, wireless networks, IoT, and mobile platforms provide targeted insights into securing diverse environments.
Advanced topics include cloud security, cryptography, and countermeasures for vulnerabilities. Frameworks like MITRE ATT&CK and tools for vulnerability assessments prepare you for real-world scenarios. Practical labs reinforce learning by simulating cybersecurity challenges, helping you build both offensive and defensive skills.
This course is ideal for IT professionals and aspiring ethical hackers with basic IT knowledge. Its intermediate difficulty is perfect for those seeking to advance their cybersecurity career or earn the CEH certification.
Syllabus
- Course 1: Introduction to Ethical Hacking and Recon Techniques
- Course 2: System Hacking, Malware Threats, and Network Attacks
- Course 3: Advanced Network Attacks, Web Hacking, and Cryptography
Courses
-
Updated in May 2025. This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. Unlock the skills needed to identify, analyze, and mitigate a wide range of cybersecurity threats in this comprehensive course. From system hacking phases to understanding advanced malware threats, you will learn to navigate the complexities of modern cyberattacks and build robust defensive strategies. The course begins with a deep dive into enumeration techniques, exploring tools and protocols such as SMB, SNMP, and LDAP to uncover system vulnerabilities. As you progress, you'll delve into vulnerability analysis, learning to assess, manage, and classify risks with industry-standard methodologies and tools. Key insights into creating effective reports will solidify your understanding of this critical process. Advanced modules guide you through system hacking techniques, from password cracking and privilege escalation to covering tracks and pivoting within networks. The malware threats section introduces cutting-edge tactics like analyzing APTs, Trojans, and fileless malware, enabling you to identify and combat these persistent dangers. Finally, you'll explore network attack techniques, including sniffing, social engineering, and denial-of-service attacks, paired with robust countermeasure strategies. This course is ideal for cybersecurity enthusiasts, IT professionals, and ethical hackers looking to enhance their skills. While a basic understanding of computer systems is helpful, no advanced technical background is required. Dive in and equip yourself to protect and secure today's digital environments.
-
Updated in May 2025. This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. Unlock the intricacies of advanced network attacks, web hacking, and cryptography in this comprehensive course designed for cybersecurity enthusiasts and professionals. You’ll gain expertise in identifying and mitigating session hijacking, evading firewalls and IDS, and exploiting web vulnerabilities, ensuring a holistic understanding of modern attack surfaces. The course begins by delving into network and perimeter hacking techniques, exploring methods to bypass security systems, and demonstrating countermeasures. Progressing further, you’ll navigate web application hacking strategies, covering web servers, common vulnerabilities, and ethical hacking methodologies, including the OWASP Top 10. Dive deep into SQL injection techniques and wireless network exploitation, mastering tools, methods, and defenses for each. Explore cutting-edge topics like mobile platform vulnerabilities, IoT device exploitation, and operational technology security. The course concludes with an extensive study of cryptography, from foundational concepts to practical tools and cryptanalysis, preparing you to implement robust encryption strategies and mitigate cryptographic attacks effectively. Ideal for cybersecurity professionals, ethical hackers, and IT specialists, this course requires a foundational knowledge of networking and basic cybersecurity concepts. It is best suited for intermediate-level learners aiming to advance their skills in offensive and defensive security strategies.
-
Updated in May 2025. This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. Unlock the essentials of ethical hacking with this comprehensive course designed to equip you with the tools and techniques to safeguard modern systems. You’ll delve into the core principles of cybersecurity, understand the motives behind cyberattacks, and learn the frameworks used by professionals to predict and counteract threats effectively. The course begins with foundational knowledge, including attacker motivations, cyber kill chains, and standards like the MITRE ATT&CK Framework. Next, you’ll explore advanced reconnaissance methods, from footprinting to social engineering recon and network scanning. Along the way, you’ll gain hands-on expertise in tools like nmap and techniques for stealthy scans, all while adhering to industry regulations and ethical guidelines. As the course progresses, you’ll master recon techniques such as Google Dorks, Shodan searches, and the use of the Diamond Model of Intrusion Analysis. You’ll also learn to analyze attack behaviors, apply threat intelligence, and model risks effectively to stay ahead of malicious actors. This course is perfect for aspiring ethical hackers, cybersecurity professionals, and IT enthusiasts eager to understand the offensive strategies that strengthen defensive security. No prior experience is necessary, making it accessible to beginners, but technical familiarity will be an asset for more advanced topics.
Taught by
Packt - Course Instructors