Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This specialization is designed to equip you with the skills needed to protect and secure digital environments. Learn the fundamentals of information security and cybersecurity, and gain a deep understanding of ethical hacking principles, red teaming, and bug hunting. Through hands-on lessons, you'll develop a deep knowledge of reconnaissance techniques, network scanning, system hacking, and vulnerability analysis, all while learning to implement effective countermeasures against threats like session hijacking, social engineering, and denial of service attacks.
Syllabus
- Course 1: Certified Ethical Hacker (CEH): Unit 1
- Course 2: Certified Ethical Hacker (CEH): Unit 2
- Course 3: Certified Ethical Hacker (CEH): Unit 3
- Course 4: Certified Ethical Hacker (CEH): Unit 4
- Course 5: Certified Ethical Hacker (CEH): Unit 5
- Course 6: Certified Ethical Hacker (CEH): Unit 6
- Course 7: Certified Ethical Hacker (CEH): Unit 7
- Course 8: Certified Ethical Hacker (CEH): Unit 8
Courses
-
This course is covers information security and ethical hacking. You'll learn the core principles of cybersecurity, exploring the critical differences between information security and cybersecurity operations. Gain insights into the cyber kill chain and ethical hacking methodologies, and learn to navigate the complexities of security laws and standards. You will aquire skills to plan and scope penetration testing assessments effectively. By the end of this course, you will be prepared to apply ethical hacking practices to safeguard digital environments.
-
This course focuses on information gathering and vulnerability identification. You will explore the essential techniques of footprinting, scanning networks, and enumeration. Learn how to gather comprehensive data on target systems using both passive and active methods, and develop a keen understanding of network structures and live hosts. You'll explore the use of advanced tools like Shodan, Maltego, and Recon-NG, for extracting critical information such as usernames, machine names, and network resources. By the end of this course, you will be equipped with the skills to conduct thorough reconnaissance.
-
This course covers ethical hacking, with a focus on vulnerability analysis, system hacking, and malware threats. You will learn to identify, assess, and prioritize vulnerabilities in systems and networks, a critical skill for preventing security breaches. You will learn about system hacking and explore techniques for gaining access, escalating privileges, and maintaining control over compromised systems. You will develop a strong understanding of malware threats, including advanced persistent threats and fileless malware, and learn how to implement effective countermeasures. By the end of this course, you will be proficient in using ethical hacking techniques to enhance the security of digital infrastructures.
-
This course is covers network vulnerabilities and defense strategies. You will explore critical concepts such as sniffing, social engineering, denial-of-service attacks, and session hijacking. Gain hands-on experience in identifying and exploiting network weaknesses while learning to implement countermeasures. You will learn how to evade Intrusion Detection Systems (IDS), firewalls, and honeypots, and understand how these technologies are used to detect and mitigate cyber threats. By the end of this course, you will be equipped with advanced techniques to safeguard networks against cyber threats.
-
This course focuses on web application security. You will learn about hacking web servers and modern web applications, whether hosted on-premise or in the cloud. Gain expertise in exploiting and securing APIs, and learn to perform SQL injections to test application vulnerabilities. You will explore the OWASP Top 10 threats, understand web server attack methodologies, and implement effective countermeasures. You will learn how to bypass client-side controls, attack authentication mechanisms, and exploit vulnerabilities such as Cross-Site Scripting and SQL injection. By the end of this course, you will be able to identify, exploit, and secure web application vulnerabilities.
-
This course covers the rapidly evolving world of wireless networks, mobile platforms, and IoT devices. You will explore the vulnerabilities inherent in mobile operating systems and applications, learning how to safeguard these critical components. You will dive into wireless network security, learning the tools and techniques used to exploit and defend against unauthorized access. You will gain insights into the security challenges of IoT and operational technology systems, including SCADA and ICS devices. By the end of this course, you will be proficient in protecting sensitive data and ensuring the integrity of digital communications.
-
This course covers cloud security and cryptographic practices. You will explore the dynamic world of cloud computing, gaining insights into common vulnerabilities, security assessment techniques, and strategies for safeguarding cloud-based assets. You will learn about cryptography, including encryption algorithms, cryptanalysis, and the critical role of cryptography in securing data both at rest and in transit. You will learn about the intersection of cloud computing and cryptography, including encryption methods used in cloud environments and emerging post-quantum cryptography algorithms. By the end of this course, you will be proficient in implementing security measures in cloud and cryptographic contexts.
-
This course is designed to equip you with the knowledge to protect large language models (LLMs) and AI systems from emerging threats. You will explore critical security challenges such as prompt injection, training data poisoning, and model theft. You will gain insights into frameworks like MITRE ATLAS and NIST, and learn to implement best practices for securing AI ecosystems. By the end of this course, you will be proficient in identifying vulnerabilities, applying mitigation strategies, and enhancing the resilience of AI systems.
Taught by
Nick Garner and Pearson