Free Online

Post Exploitation Courses and Certifications

Master advanced penetration testing techniques including file transfers, privilege escalation, and persistence mechanisms across Windows, Linux, and cloud environments. Learn practical post-exploitation skills using Metasploit, Armitage, and custom tools through hands-on tutorials on YouTube, Udemy, and Cybrary from security conference speakers and ethical hacking experts.

38 courses
Showing 38 courses
Filter by
Filters
  1. Level
  2. Duration
  3. Language
    • YouTube
    • 51 minutes
    • On-Demand
    • Conference Talk
    • Udemy
    • 1 hour 4 minutes
    • On-Demand
    • Paid Course
    • Udemy
    • 15 hours 32 minutes
    • On-Demand
    • Paid Course
    • Udemy
    • 4 hours 18 minutes
    • On-Demand
    • Paid Course
    • Udemy
    • 7 hours 19 minutes
    • On-Demand
    • Paid Course
    • Coursera
    • 14 hours 37 minutes
    • On-Demand
    • Paid Course
    • Coursera
    • 4 weeks, 10 hours a week
    • On-Demand
    • Paid Course
    • 3 courses

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.