Vulnerability Scanning Network Attacks

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Vulnerability Scanning Network Attacks

Coursera · Advanced ·🔐 Cybersecurity ·1w ago
This course moves from reconnaissance into active exploitation, covering approximately 4 hours and 50 minutes of expert instruction across four focused modules. In Vulnerability Scanning Fundamentals, learners are introduced to the scanning process with live demos and hands-on Nmap labs. Advanced Scanning and Credential Attacks then deepens that foundation — covering target considerations, scan analysis, Nmap scoping and timing, vulnerability prioritization using CVSS and EPSS scoring, and credential attack techniques including password cracking labs. Network-Based Attacks shifts into exploitation, covering man-in-the-middle techniques, ARP spoofing, DNS attacks, and service exploitation. The course closes with Wireless and RF Attacks, exploring WPA2 handshake cracking, evil twin access points, Bluetooth vulnerabilities, and other RF-based attack techniques. Learners benefit by gaining practical skills in vulnerability analysis, network protocol exploitation, man-in-the-middle attacks, packet manipulation, and wireless network cracking — techniques directly applicable to real-world red team engagements and defensive security roles. The course integrates Labtainers hands-on labs with Nmap, Wireshark, and Metasploit, bridging the gap between theory and practice. By the end of this course, learners will be able to conduct a full vulnerability scanning cycle and exploit common network and wireless vulnerabilities in a controlled, authorized environment.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Investigating Scam Infrastructure Using OSINT — Inside The Scam Industry (Part 2)
Learn to investigate scam infrastructure using OSINT techniques to uncover the scam industry's inner workings
Medium · Cybersecurity
The Blind Spot of AI Evolution: Why Model Context Protocol (MCP) is a Legal and Security Ticking…
AI model context protocol (MCP) has a blind spot that poses legal and security risks, understand why it matters for secure AI integration
Medium · Cybersecurity
Smart Ways to Recover RAID 5 on Dell, HP, and Lenovo Servers Without Data Loss
Recover RAID 5 on Dell, HP, and Lenovo servers without data loss using smart techniques
Medium · Cybersecurity
Engineering Around Bitcoin's Traditional Platform Lockdowns
Learn how to engineer around Bitcoin's platform lockdowns for seamless borderless transactions
Dev.to · ruth mhlanga
Up next
Your AWS IAM Starter Checklist
AWS Developers
Watch →