Unlock the skills needed to identify, analyze, and mitigate a wide range of cybersecurity threats in this comprehensive course. From system hacking phases to understanding advanced malware threats, you will learn to navigate the complexities of modern cyberattacks and build robust defensive strategies.
![Packt](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/http://coursera-university-assets.s3.amazonaws.com/fa/3b9b5304c24cf4aa64054631ee946c/360-360-square.png?auto=format%2Ccompress&dpr=1&w=28&h=28)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/1a4589dccee10648821b7ea23e5fca9a.png?auto=format%2Ccompress&dpr=1&q=80)
![Packt](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/http://coursera-university-assets.s3.amazonaws.com/c7/391d0e5f6a4d648dc4f754c5898df7/2.png?auto=format%2Ccompress&dpr=1&h=45)
System Hacking, Malware Threats, and Network Attacks
Dieser Kurs ist Teil von Spezialisierung Certified Ethical Hacker (CEH) v.12
![Packt - Course Instructors](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-instructor-photos.s3.amazonaws.com/2b/9c92f373414941b4a0bbda577bd627/profile.jpg?auto=format%2Ccompress&dpr=1&w=75&h=75&fit=crop)
Dozent: Packt - Course Instructors
Bei enthalten
Empfohlene Erfahrung
Was Sie lernen werden
Master enumeration techniques using protocols like SMB, SNMP, and LDAP.
Develop strategies for effective vulnerability assessment and management.
Execute advanced system hacking techniques, including privilege escalation.
Analyze malware types and deploy countermeasures to mitigate threats.
Wichtige Details
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/31ebcba3851b87d1d8609abf15d0ff7e.png?auto=format%2Ccompress&dpr=1&w=24&h=24)
Zu Ihrem LinkedIn-Profil hinzufügen
Februar 2025
8 Aufgaben
Erfahren Sie, wie Mitarbeiter führender Unternehmen gefragte Kompetenzen erwerben.
![Platzhalter](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/74c8747e8210831049cf88dd4eefe26c.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=320)
Erweitern Sie Ihre Fachkenntnisse
- Lernen Sie neue Konzepte von Branchenexperten
- Gewinnen Sie ein Grundverständnis bestimmter Themen oder Tools
- Erwerben Sie berufsrelevante Kompetenzen durch praktische Projekte
- Erwerben Sie ein Berufszertifikat zur Vorlage
![Platzhalter](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/a7c5400e51272c78b710ce9b56fd3178.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=562)
![Platzhalter](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/de1a6556fbe605411e8c1c2ca4ba45f1.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=259)
Erwerben Sie ein Karrierezertifikat.
Fügen Sie diese Qualifikation zur Ihrem LinkedIn-Profil oder Ihrem Lebenslauf hinzu.
Teilen Sie es in den sozialen Medien und in Ihrer Leistungsbeurteilung.
![Platzhalter](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/de1a6556fbe605411e8c1c2ca4ba45f1.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=333)
In diesem Kurs gibt es 7 Module
In this module, we will dive into enumeration techniques essential for uncovering critical information about target systems. You will learn how to leverage protocols like SMB, SNMP, LDAP, and others to gather data and explore methods for enumerating email systems and file-sharing services. These skills will enable you to expand on initial reconnaissance and uncover actionable insights for penetration testing.
Das ist alles enthalten
6 Videos2 Lektüren1 Aufgabe
In this module, we will explore the process of vulnerability analysis, including assessment concepts, classifications, and lifecycle stages. You will gain hands-on knowledge of tools, assessment types, and models to uncover and manage system weaknesses effectively. This module equips you with the necessary skills to conduct thorough assessments and present actionable insights through detailed vulnerability reports.
Das ist alles enthalten
6 Videos1 Aufgabe
In this module, we will delve into the core hacking techniques used in ethical hacking operations. You’ll explore Windows authentication methods, password attacks, buffer overflow exploitation, and privilege escalation. Additionally, we will cover post-exploitation techniques such as maintaining access, covering tracks, and pivoting. By the end of this module, you’ll have a well-rounded understanding of system hacking tactics and their countermeasures
Das ist alles enthalten
13 Videos1 Aufgabe
In this module, we will examine the different types of malware, their characteristics, and their deployment methods. From traditional viruses and worms to sophisticated threats like APTs and fileless malware, you’ll gain insights into their behavior and impacts. You’ll also learn about malware analysis techniques and explore countermeasures to protect systems against these persistent threats.
Das ist alles enthalten
7 Videos1 Aufgabe
In this module, we will uncover the techniques attackers use to intercept sensitive data through network sniffing. You’ll learn about protocols and vulnerabilities exploited in attacks like ARP poisoning and DNS spoofing, and you’ll explore countermeasures to secure network communications. These skills will help you identify and protect against interception threats effectively.
Das ist alles enthalten
5 Videos1 Aufgabe
In this module, we will delve into the human aspect of cybersecurity—social engineering. You’ll explore techniques attackers use to exploit human vulnerabilities, including identity theft and insider threats. By understanding these attack methods, you’ll be better equipped to implement preventative strategies and foster a security-aware culture within organizations.
Das ist alles enthalten
3 Videos1 Aufgabe
In this module, we will focus on denial-of-service (DoS) attacks, one of the most disruptive forms of cyber threats. You’ll explore the mechanics of attacks like volumetric floods, SYN floods, and SlowLoris, and you’ll learn about botnets’ role in amplifying their impact. By understanding these threats, you’ll be able to design effective countermeasures to safeguard systems against service disruptions.
Das ist alles enthalten
6 Videos1 Lektüre2 Aufgaben
Dozent
![Packt - Course Instructors](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-instructor-photos.s3.amazonaws.com/2b/9c92f373414941b4a0bbda577bd627/profile.jpg?auto=format%2Ccompress&dpr=1&w=75&h=75&fit=crop)
von
Empfohlen, wenn Sie sich für Security interessieren
Warum entscheiden sich Menschen für Coursera für ihre Karriere?
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Felipe_Moitta.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Jennifer_John.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Larry_Tao_Wang_1.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Chaitanya_Anand.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
![Platzhalter](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/7a1c0e2e779c1ff27cae62480adfe003.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=120)
Neue Karrieremöglichkeiten mit Coursera Plus
Unbegrenzter Zugang zu 10,000+ Weltklasse-Kursen, praktischen Projekten und berufsqualifizierenden Zertifikatsprogrammen - alles in Ihrem Abonnement enthalten
Bringen Sie Ihre Karriere mit einem Online-Abschluss voran.
Erwerben Sie einen Abschluss von erstklassigen Universitäten – 100 % online
Schließen Sie sich mehr als 3.400 Unternehmen in aller Welt an, die sich für Coursera for Business entschieden haben.
Schulen Sie Ihre Mitarbeiter*innen, um sich in der digitalen Wirtschaft zu behaupten.
Häufig gestellte Fragen
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.