Application, Cloud, and Specialized Attacks

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Application, Cloud, and Specialized Attacks

Coursera · Beginner ·🔐 Cybersecurity ·1d ago
This course expands the learner’s hacking toolkit to cover approximately 3 hours and 30 minutes of expert instruction across five focused modules. Web Application and Database Attacks opens the course, covering SQL injection, cross-site scripting, CSRF, API attacks, and hands-on Labtainers labs. Privilege Escalation and Local Host Attacks then addresses what happens after gaining a foothold — covering Linux and Windows privilege escalation and miscellaneous local host vulnerabilities. Attacking the Cloud addresses misconfigurations and exploitation in AWS, Azure, and other cloud environments. Specialized and Fragile Systems introduces testing approaches for mobile devices, virtual and containerized environments, and industrial control systems. The course closes with Social Engineering and Physical Attacks, covering phishing campaigns, spear phishing, in-person social engineering, and physical security assessments.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Breaking Infinity
Learn to identify and defend against lock-free ring buffer vulnerabilities in cybersecurity
Medium · Cybersecurity
When Our Digital Infrastructure Goes Offline: Lessons from the Global Canvas Breach
Learn from the Global Canvas breach to improve digital infrastructure security and shared responsibility
Medium · Cybersecurity
Breaking Authentication Through Password Change Logic Flaws — PortSwigger Lab Walkthrough
Learn to break authentication through password change logic flaws and understand why it matters for cybersecurity
Medium · Cybersecurity
AWS Elastic Beanstalk Pentesting with AWS CLI
Learn to pentest AWS Elastic Beanstalk using AWS CLI commands and Cloudgoat, a vulnerable AWS environment, to improve cloud security skills
Medium · Cybersecurity
Up next
Threat Hunting with Taz Wake
SANS Institute
Watch →